RandOhm: Mitigating Impedance Side-channel Attacks using Randomized Circuit Configurations
CoRR(2024)
摘要
Physical side-channel attacks can compromise the security of integrated
circuits. Most of the physical side-channel attacks (e.g., power or
electromagnetic) exploit the dynamic behavior of a chip, typically manifesting
as changes in current consumption or voltage fluctuations where algorithmic
countermeasures, such as masking, can effectively mitigate the attacks.
However, as demonstrated recently, these mitigation techniques are not entirely
effective against backscattered side-channel attacks such as impedance
analysis. In the case of an impedance attack, an adversary exploits the
data-dependent impedance variations of chip power delivery network (PDN) to
extract secret information. In this work, we introduce RandOhm, which exploits
moving target defense (MTD) strategy based on partial reconfiguration of
mainstream FPGAs, to defend against impedance side-channel attacks. We
demonstrate that the information leakage through the PDN impedance could be
reduced via run-time reconfiguration of the secret-sensitive parts of the
circuitry. Hence, by constantly randomizing the placement and routing of the
circuit, one can decorrelate the data-dependent computation from the impedance
value. To validate our claims, we present a systematic approach equipped with
two different partial reconfiguration strategies on implementations of the AES
cipher realized on 28-nm FPGAs. We investigate the overhead of our mitigation
in terms of delay and performance and provide security analysis by performing
non-profiled and profiled impedance analysis attacks against these
implementations to demonstrate the resiliency of our approach.
更多查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要