Paper 2023/034

PROLEAD_SW - Probing-Based Software Leakage Detection for ARM Binaries

Jannik Zeitschner, Ruhr University Bochum
Nicolai Müller, Ruhr University Bochum
Amir Moradi, Ruhr University Bochum
Abstract

A decisive contribution to the all-embracing protection of cryptographic software, especially on embedded devices, is the protection against SCA attacks. Masking countermeasures can usually be integrated into the software during the design phase. In theory, this should provide reliable protection against such physical attacks. However, the correct application of masking is a non-trivial task that often causes even experts to make mistakes. In addition to human-caused errors, micro-architectural CPU effects can lead even a seemingly theoretically correct implementation to fail to satisfy the desired level of security in practice. This originates from different components of the underlying CPU which complicates the tracing of leakage back to a particular source and hence avoids making general and device-independent statements about its security. PROLEAD has recently been presented at CHES 2022 and has originally been developed as a simulation-based tool to evaluate masked hardware designs. In this work, we adapt PROLEAD for the evaluation of masked software, and enable the transfer of the already known benefits of PROLEAD into the software world. These include (1) evaluation of larger designs compared to the state of the art, e.g. a full AES masked implementation, and (2) formal verification under our new generic leakage model for CPUs. Concretely, we formalize leakages, observed across different CPU architectures, into a generic abstraction model that includes all these leakages and is therefore independent of a specific CPU design. Our resulting tool PROLEAD_SW allows to provide a formal statement on the security based on the derived generic model. As a concrete result, using PROLEAD_SW we evaluated the security of several publicly available masked software implementations in our new generic leakage model and reveal multiple vulnerabilities.

Note: PROLEAD_SW is available via GitHub: https://github.com/ChairImpSec/PROLEAD

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Published by the IACR in TCHES 2023
Keywords
Side-Channel AnalysisLeakage DetectionProbing SecuritySoftwareARM
Contact author(s)
jannik zeitschner @ rub de
nicolai mueller @ rub de
amir moradi @ rub de
History
2023-04-21: last of 2 revisions
2023-01-11: received
See all versions
Short URL
https://ia.cr/2023/034
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/034,
      author = {Jannik Zeitschner and Nicolai Müller and Amir Moradi},
      title = {PROLEAD_SW - Probing-Based Software Leakage Detection for ARM Binaries},
      howpublished = {Cryptology ePrint Archive, Paper 2023/034},
      year = {2023},
      note = {\url{https://eprint.iacr.org/2023/034}},
      url = {https://eprint.iacr.org/2023/034}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.