Paper 2023/1395

Generic SCARE: reverse engineering without knowing the algorithm nor the machine

Ronan Lashermes, French Institute for Research in Computer Science and Automation
Hélène Le Bouder, Institut Mines-Télécom
Abstract

We introduce a novel side-channel-based reverse engineering technique capable of reconstructing a procedure solely from inputs, outputs, and traces of execution. Beyond generic restrictions, we do not assume any prior knowledge of the procedure or the chip it operates on. These restrictions confine our analysis to 8-bit RISC constant-time software implementations. Specifically, we demonstrate the feasibility of reconstructing a symmetric cryptographic cipher, even in scenarios where traces are sampled with information loss and noise, such as when measuring the power consumption of the chip.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Side channelsreverse engineeringSCARERISC
Contact author(s)
ronan lashermes @ inria fr
helene le-bouder @ imt-atlantique fr
History
2023-09-21: approved
2023-09-18: received
See all versions
Short URL
https://ia.cr/2023/1395
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/1395,
      author = {Ronan Lashermes and Hélène Le Bouder},
      title = {Generic SCARE: reverse engineering without knowing the algorithm nor the machine},
      howpublished = {Cryptology ePrint Archive, Paper 2023/1395},
      year = {2023},
      note = {\url{https://eprint.iacr.org/2023/1395}},
      url = {https://eprint.iacr.org/2023/1395}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.