Paper 2021/905
A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage
Abstract
Advances in cryptography have enabled the features of confidentiality, security, and integrity on small embedded devices such as IoT devices. While mathematically strong, the platform on which an algorithm is implemented plays a significant role in the security of the final product. Side-channel attacks exploit the variations in the system’s physical characteristics to obtain information about the sensitive data. In our scenario, a software implementation of a cryptographic algorithm is flashed on devices from different manufactures with the same instruction set configured for identical execution. To analyze the influence of the microarchitecture on side-channel leakage, we acquire thirty-two sets of power traces from four physical devices. While we notice minor differences in the leakage behaviour for different physical boards from the same manufacturer, our results confirm that the difference in microarchitecture implementations will leak different side-channel information. We also show that TVLA leakage prediction should be treated with caution as it is sensitive to both false positives and negatives.
Note: arora at riscure dot com
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. CARDIS
- Keywords
- micro-architecture side-channel leakage
- Contact author(s)
-
arora @ riscure com
ileana buhan @ gmail com
guilhermeperin7 @ gmail com
picek stjepan @ gmail com - History
- 2022-07-01: revised
- 2021-07-05: received
- See all versions
- Short URL
- https://ia.cr/2021/905
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2021/905, author = {Vipul Arora and Ileana Buhan and Guilherme Perin and Stjepan Picek}, title = {A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage}, howpublished = {Cryptology {ePrint} Archive, Paper 2021/905}, year = {2021}, url = {https://eprint.iacr.org/2021/905} }