You are looking at a specific version 20210705:185055 of this paper. See the latest version.

Paper 2021/905

A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage

Vipul Arora and Ileana Buhan and Guilherme Perin and Stjepan Picek

Abstract

Advances in cryptography have enabled the features of confidentiality, security, and integrity on small embedded devices such as IoT devices. While mathematically strong, the platform on which an algorithm is implemented plays a significant role in the security of the final product. Side-channel attacks exploit the variations in the system’s physical characteristics to obtain information about the sensitive data. In our scenario, a software implementation of a cryptographic algorithm is flashed on devices from different manufactures with the same instruction set configured for identical execution. To analyze the influence of the microarchitecture on side-channel leakage, we acquire thirty-two sets of power traces from four physical devices. While we notice minor differences in the leakage behaviour for different physical boards from the same manufacturer, our results confirm that the difference in microarchitecture implementations will leak different side-channel information. We also show that TVLA leakage prediction should be treated with caution as it is sensitive to both false positives and negatives.

Note: arora at riscure dot com

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint. MINOR revision.
Keywords
micro-architectureside-channel leakage
Contact author(s)
arora @ riscure com,ileana buhan @ ru nl,picek stjepan @ gmail com,guilhermeperin7 @ gmail com
History
2022-07-01: revised
2021-07-05: received
See all versions
Short URL
https://ia.cr/2021/905
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.