Paper 2021/1569

ABBY: Automating leakage modeling for side-channels analysis

Omid Bazangani, Radboud University Nijmegen
Alexandre Iooss
Ileana Buhan, Radboud University Nijmegen
Lejla Batina, Radboud University Nijmegen
Abstract

We introduce ABBY, an open-source side-channel leakage profiling framework that targets the microarchitectural layer. Existing solutions to characterize the microarchitectural layer are device-specific and require extensive manual effort. The main innovation of ABBY is the collection of data, which can automatically characterize the microarchitecture of a target device and has the additional benefit of being scalable. Using ABBY, we create two sets of data which capture the interaction of instructions for the ARM CORTEX-M0/M3 architecture. These sets are the first to capture detailed information on the microarchitectural layer. They can be used to explore various leakage models suitable for creating sidechannel leakage simulators. A preliminary evaluation of a leakage model produced with our dataset of real-world cryptographic implementations shows performance comparable to state-of-the-art leakage simulators.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint.
Keywords
side-channelsleakage simulatorlinear regressionmicroarchitecture
Contact author(s)
omid bazangani @ gmail com
Ileana buhan @ ru nl
Lejla batina @ ru nl
History
2023-05-01: last of 4 revisions
2021-12-03: received
See all versions
Short URL
https://ia.cr/2021/1569
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/1569,
      author = {Omid Bazangani and Alexandre Iooss and Ileana Buhan and Lejla Batina},
      title = {{ABBY}: Automating leakage modeling for side-channels analysis},
      howpublished = {Cryptology {ePrint} Archive, Paper 2021/1569},
      year = {2021},
      url = {https://eprint.iacr.org/2021/1569}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.