Paper 2021/756

A Novel Completeness Test and its Application to Side Channel Attacks and Simulators

Si Gao and Elisabeth Oswald

Abstract

Today's side channel attack targets are often complex devices in which instructions are processed in parallel and work on 32-bit data words. Consequently, the state that is involved in producing leakage in these modern devices is large, and basing evaluations (i.e. worst case attacks), simulators, and assumptions for (masking) countermeasures on a potentially incomplete state can lead to drastically wrong conclusions. We put forward a novel notion for the ``completeness'' of an assumed state, together with an efficient statistical test that is based on ``collapsed models''. Our novel test can be used to recover a state that contains multiple 32-bit variables in a grey box setting. We illustrate how our novel test can help to guide side channel attacks and we reveal new attack vectors for existing implementations. We also show how the application of our statistical test shows where even the most recent leakage simulators do not capture all available leakage of their respective target devices.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
A major revision of an IACR publication in EUROCRYPT 2022
Keywords
Leakage modelSide Channel AttacksSimulatorsSecurity evaluation
Contact author(s)
si-gao @ outlook com
Elisabeth Oswald @ aau at
History
2022-03-01: last of 2 revisions
2021-06-07: received
See all versions
Short URL
https://ia.cr/2021/756
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/756,
      author = {Si Gao and Elisabeth Oswald},
      title = {A Novel Completeness Test and its Application to Side Channel Attacks and Simulators},
      howpublished = {Cryptology {ePrint} Archive, Paper 2021/756},
      year = {2021},
      url = {https://eprint.iacr.org/2021/756}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.