mind the portability
play

Mind The Portability A Warriors Guide through Realistic Profiled - PowerPoint PPT Presentation

Mind The Portability A Warriors Guide through Realistic Profiled Side-channel Analysis Shivam Bhasin 1 , Dirmanto Jap 1 , Anupam Chattopadhyay 1 , Stjepan Picek 2 , Annelie Heuser 3 , and Ritu Ranjan Shrivastwa 4 1 NTU, Singapore 2 TU Delft,


  1. Mind The Portability A Warriors Guide through Realistic Profiled Side-channel Analysis Shivam Bhasin 1 , Dirmanto Jap 1 , Anupam Chattopadhyay 1 , Stjepan Picek 2 , Annelie Heuser 3 , and Ritu Ranjan Shrivastwa 4 1 NTU, Singapore 2 TU Delft, Netherlands 3 IRISA, France 4 Secure-IC France NDSS 2020, San Diego 23-26 February 2020

  2. Side-Channel Analysis (SCA) Side-channel measurement Encryption requests Energy Timing reference THEN NOW 2

  3. EMA SPA, DPA, templates, etc. ⇒ Side-channel trace What is SCA? TA • Non-invasive (power, EM, timing, …) Attacked circuit Time • Powerful & practical. Ex: – Keeloq – FPGA Bitstream encryption – Bitcoin wallets – … • Applications: Secret key recovery and more … • Serious threat to embedded systems 3

  4. Types of SCA • Simple SCA (ex. Visual inspection) • Non Profiled SCA (ex. DPA, CPA, other on the fly statistical attacks) • Profiled SCA (ex. Templates, Machine-Learning based attacks) In the following, we focus on profiled power/EM attacks on embedded devices targeting encryption algorithms for secret key recovery 4

  5. Profiled SCA Profiling Phase Attack Phase Known Key Unknown Key Device 1 Device 2 Traces Label hypothesis Labels Traces train Profiled Classification Secret Classification Algorithm Model Algorithm Key • Target exploitation in few traces, ideally single trace • Classification Algorithm: Template Attacks (TA) vs Machine Learning (ML) • Deep Learning has shown great success with protected implementations 5 • Recent work with deep learning report successful attack in 100X less traces (500 vs 5).

  6. Expectations vs Reality Attack Phase Profiling Phase Known Key Unknown Key Device 1 Device 2 Traces Label hypothesis Labels Traces train E x p e c t e d Classification Profiled Classification Secret Algorithm Model Algorithm Key 6

  7. Expectations vs Reality Attack Phase Profiling Phase Unknown Key Known Key Device 1 Device 2 Traces Label hypothesis Labels Traces train Traces test Reality E x p e c t e d Classification Profiled Classification Secret Algorithm Model Algorithm Key 7

  8. Portability • B and B’ are two copies of same device • Differences between B and B’ are due to uncontrolled variations in process, measurement setup, or other stochastic factors • Portability denotes all settings in which an attacker can conduct the training on the measurement data obtained from a clone device B’ and import the learned knowledge L B’ to model the actual device B, under similar parameter setup 8

  9. Practical Study of Portability 9 Different Sources Of Portability: Process variation (chip, wires, PCB components, connectors), environmental factors, ...

  10. Comparing Signal Quality 10

  11. Comparing SCA Vulnerability 11

  12. Same Device Different Device > 2 0 X Same Key D e g r a d a t i o n Different Key 12

  13. Why Does It Happen? !!! OVERFITTING !!! 13

  14. Proposed Multi-Device Model Attack Phase Profiling Phase Unknown Key Known Key Device test Device 1 Device 2 Device 3 Traces test Label hypothesis Labels Traces val Traces train Classification Profiled Classification Secret Algorithm Model Algorithm Key 14

  15. Proposed Multi-Device Model • Multiple Device Model (MDM) denotes all settings where attacker can conduct the training on measurement data from a number of similar devices (≥ 2), B’ = {B 0 ’,..., B n−1 ’} > 10X improvements and import the learned knowledge L B’ to model the actual device B, under similar but uncontrolled parameter setup 15

  16. Overcoming Human Error • Electromagnetic measurements often preferred over power measurements – Easy access – High SNR – Localized Leakage capture – … • Extremely sensitive to probe position (position, distance, and orientation) • Error comes naturally when measuring on multiple devices • We call this human error of placement • A classical case of Portability 16

  17. Overcoming Human Error • Electromagnetic measurements often preferred over power measurements – Easy access – High SNR – Localized Leakage capture – … • Extremely sensitive to probe position MDM (position, distance, and orientation) • Error comes naturally when measuring on multiple devices • We call this human error of placement • A classical case of Portability 17

  18. Conclusions • One must consider portability issues in machine learning based SCA • We proposed Multiple Device Model (MDM) to overcome portability • Direct application to EM measurement • Future Directions: – Application to heterogenous devices – MDM with one device noise, process-variation models 18

  19. Thank You !!! 19

  20. Side-Channel Analysis (SCA) 20 Lets look at a basic CMOS cell

  21. Side-Channel Analysis (SCA) 1 à 0 Random Number Generator ENTROPY ENTROPY POST- TRNG OUTPUT PROCESSING SOURCE EXTRACTION RANDOMNESS SOURCE ONLINE ALARM TEST RAW OUTPUT Extending from one cell to a full circuit Measure by Electromagnetic Probe 0 à 1 21

  22. Expectations vs Reality • Profiling and Testing device MUST be distinct • An aspect often overlooked in profiled SCA research • Leads to pessimistic security evaluations • A common issue for certification labs evaluating security-critical products • Known as Portability 22

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend