TUHH Open Research
Help
  • Log In
    New user? Click here to register.Have you forgotten your password?
  • English
  • Deutsch
  • Communities & Collections
  • Publications
  • Research Data
  • People
  • Institutions
  • Projects
  • Statistics
  1. Home
  2. TUHH
  3. Publication References
  4. Power Contracts: Provably Complete Power Leakage Models for Processors
 
Options

Power Contracts: Provably Complete Power Leakage Models for Processors

Publikationstyp
Conference Paper
Date Issued
2022-11
Sprache
English
Author(s)
Bloem, Roderick  
Gigerl, Barbara  
Gourjon, Marc Olivier  
Hadzic, Vedad  
Mangard, Stefan  
Primas, Robert  
Institut
Sicherheit in verteilten Anwendungen E-15 (H)  
TORE-URI
http://hdl.handle.net/11420/14325
Start Page
381
End Page
395
Citation
28th ACM SIGSAC Conference on Computer and Communications Security (CCS 2022)
Contribution to Conference
28th ACM SIGSAC Conference on Computer and Communications Security, CCS 2022  
Publisher DOI
10.1145/3548606.3560600
Scopus ID
2-s2.0-85143056045
The protection of cryptographic software implementations against power-analysis attacks is critical for applications in embedded systems. A commonly used algorithmic countermeasure against these attacks is masking, a secret-sharing scheme that splits a sensitive computation into computations on multiple random shares. In practice, the security of masking schemes relies on several assumptions that are often violated by microarchitectural side-effects of CPUs. Many past works address this problem by studying these leakage effects and building corresponding leakage models that can then be integrated into a software verification workflow. However, these models have only been derived empirically, putting in question the otherwise rigorous security statements made with verification. We solve this problem in two steps. First, we introduce a contract layer between the (CPU) hardware and the software that allows the specification of microarchitectural side-effects on masked software in an intuitive language. Second, we present a method for proving the correspondence between contracts and CPU netlists to ensure the completeness of the specified leakage models. Then, any further security proofs only need to happen between software and contract, which brings benefits such as reduced verification runtime, improved user experience, and the possibility of working with vendor-supplied contracts of CPUs whose design is not available on netlist-level due to IP restrictions. We apply our approach to the popular RISC-V IBEX core, provide a corresponding formally verified contract, and describe how this contract could be used to verify masked software implementations.
Subjects
contract
domain-specific language
leakage model
masking
power side-channel
probing security
verification
TUHH
Weiterführende Links
  • Contact
  • Send Feedback
  • Cookie settings
  • Privacy policy
  • Impress
DSpace Software

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science
Design by effective webwork GmbH

  • Deutsche NationalbibliothekDeutsche Nationalbibliothek
  • ORCiD Member OrganizationORCiD Member Organization
  • DataCiteDataCite
  • Re3DataRe3Data
  • OpenDOAROpenDOAR
  • OpenAireOpenAire
  • BASE Bielefeld Academic Search EngineBASE Bielefeld Academic Search Engine
Feedback