Paper 2024/423

Plan your defense: A comparative analysis of leakage detection methods on RISC-V cores

Konstantina Miteloudi, Radboud University Nijmegen
Asmita Adhikary, Radboud University Nijmegen
Niels van Drueten, Radboud University Nijmegen
Lejla Batina, Radboud University Nijmegen
Ileana Buhan, Radboud University Nijmegen
Abstract

Hardening microprocessors against side-channel attacks is a critical aspect of ensuring their security. A key step in this process is identifying and mitigating “leaky” hardware modules, which inadvertently leak information during the execution of cryptographic algorithms. In this paper, we explore how different leakage detection methods, the Side-channel Vulnerability Factor (SVF) and the Test Vector Leakage Assessment (TVLA), contribute to hardening of microprocessors. We conduct experiments on two RISC-V cores, SHAKTI and Ibex, using two cryptographic algorithms, SHA-3 and AES. Our findings suggest that SVF and TVLA can provide valuable insights into identifying leaky modules. However, the effectiveness of these methods can vary depending on the specific core and cryptographic algorithm in use. We conclude that the choice of leakage detection method should be based not only on computational cost but also on the specific requirements of the system and the nature of the potential threats. Our research contributes to developing more secure microprocessors that are robust against side-channel attacks.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Preprint.
Keywords
Pre-Silicon DesignSide-Channel AnalysisLeakage Detection MethodsHardening Microprocessors
Contact author(s)
kmiteloudi @ cs ru nl
asmita adhikary @ ru nl
niels @ vandrueten nl
lejla @ cs ru nl
ileana buhan @ ru nl
History
2024-03-15: approved
2024-03-11: received
See all versions
Short URL
https://ia.cr/2024/423
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/423,
      author = {Konstantina Miteloudi and Asmita Adhikary and Niels van Drueten and Lejla Batina and Ileana Buhan},
      title = {Plan your defense: A comparative analysis of leakage detection methods on RISC-V cores},
      howpublished = {Cryptology ePrint Archive, Paper 2024/423},
      year = {2024},
      note = {\url{https://eprint.iacr.org/2024/423}},
      url = {https://eprint.iacr.org/2024/423}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.