Cryptology ePrint Archive: Report 2021/1569

ABBY: Automating the creation of fine-grained leakage models

Omid Bazangani and Alexandre Iooss and Ileana Buhan and Lejla Batina

Abstract: Side-channel leakage simulators allow testing the resilience of cryptographic implementations to power side-channel attacks without a dedicated setup. The main challenge in their large-scale deployment is the limited support for target devices, a direct consequence of the effort required for reverse engineering microarchitecture implementations. We introduce ABBY, the first solution for the automated creation of fine-grained leakage models. The main innovation of ABBY is the training framework, which can automatically characterize the microarchitecture of the target device and is portable to other platforms. Evaluation of ABBY on real-world crypto implementations exhibits comparable performance to other state-of-the-art leakage simulators.

Category / Keywords: implementation / side-channels, leakage simulator, neural networks, microarchitecture

Date: received 30 Nov 2021, last revised 6 Dec 2021

Contact author: omid bazangani at gmail com, omid bazangani at ru nl, alexandre iooss at crans org, ileana buhan at ru nl, lejla batina at ru nl

Available format(s): PDF | BibTeX Citation

Version: 20211206:091419 (All versions of this report)

Short URL: ia.cr/2021/1569


[ Cryptology ePrint archive ]