基于重键的移动目标侧信道攻击防御机制

Satyanarayana Vuppala, A. Mady, Adam Kuenzi
{"title":"基于重键的移动目标侧信道攻击防御机制","authors":"Satyanarayana Vuppala, A. Mady, Adam Kuenzi","doi":"10.1109/GIOTS.2019.8766426","DOIUrl":null,"url":null,"abstract":"In this paper, we present a side-channel resilient moving target defence mechanism against power-/electromagnetic-based side-channel attacks. Recent countermeasures use fresh re-keying after every encryption/decryption process; this causes major overhead in synchronizing the communicating parties. In contrast to prior work, our mechanism integrates fresh re-keying and masking techniques at an interval, where these techniques are driven by the maximum number of side-channel leakage traces required towards a successful embedded attack. Hence, the mechanism tracks the effect of attacks on the number of traces, and consequently applies re-keying at suitable intervals to reduce the computational/communication overhead, while increasing the attack cost. The mechanism scalability was evaluated against an advanced attack model based on machine learning methods that reduces significantly the number of traces required for a successful attack under masking implementation.","PeriodicalId":149504,"journal":{"name":"2019 Global IoT Summit (GIoTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Rekeying-based Moving Target Defence Mechanism for Side-Channel Attacks\",\"authors\":\"Satyanarayana Vuppala, A. Mady, Adam Kuenzi\",\"doi\":\"10.1109/GIOTS.2019.8766426\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we present a side-channel resilient moving target defence mechanism against power-/electromagnetic-based side-channel attacks. Recent countermeasures use fresh re-keying after every encryption/decryption process; this causes major overhead in synchronizing the communicating parties. In contrast to prior work, our mechanism integrates fresh re-keying and masking techniques at an interval, where these techniques are driven by the maximum number of side-channel leakage traces required towards a successful embedded attack. Hence, the mechanism tracks the effect of attacks on the number of traces, and consequently applies re-keying at suitable intervals to reduce the computational/communication overhead, while increasing the attack cost. The mechanism scalability was evaluated against an advanced attack model based on machine learning methods that reduces significantly the number of traces required for a successful attack under masking implementation.\",\"PeriodicalId\":149504,\"journal\":{\"name\":\"2019 Global IoT Summit (GIoTS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 Global IoT Summit (GIoTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GIOTS.2019.8766426\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Global IoT Summit (GIoTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GIOTS.2019.8766426","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

在本文中,我们提出了一种针对基于功率/电磁的侧信道攻击的侧信道弹性移动目标防御机制。最近的对策是在每次加密/解密过程后使用新的密钥;这将导致通信各方同步的主要开销。与之前的工作相比,我们的机制在一段时间内集成了新的重键和掩蔽技术,其中这些技术是由成功嵌入攻击所需的最大数量的侧信道泄漏迹驱动的。因此,该机制跟踪攻击对跟踪数的影响,从而在适当的间隔内应用重新密钥,以减少计算/通信开销,同时增加攻击成本。该机制的可扩展性根据基于机器学习方法的高级攻击模型进行了评估,该模型显着减少了在屏蔽实现下成功攻击所需的跟踪数量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Rekeying-based Moving Target Defence Mechanism for Side-Channel Attacks
In this paper, we present a side-channel resilient moving target defence mechanism against power-/electromagnetic-based side-channel attacks. Recent countermeasures use fresh re-keying after every encryption/decryption process; this causes major overhead in synchronizing the communicating parties. In contrast to prior work, our mechanism integrates fresh re-keying and masking techniques at an interval, where these techniques are driven by the maximum number of side-channel leakage traces required towards a successful embedded attack. Hence, the mechanism tracks the effect of attacks on the number of traces, and consequently applies re-keying at suitable intervals to reduce the computational/communication overhead, while increasing the attack cost. The mechanism scalability was evaluated against an advanced attack model based on machine learning methods that reduces significantly the number of traces required for a successful attack under masking implementation.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信