Exploring Cortex-M Microarchitectural Side Channel Information Leakage
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, cryptographic implementations. Such implementations, however, are microarchitecture-specific, and cannot be implemented without an in-depth structural knowledge of the CPU and memory information leakage pat...
Guardado en:
Autores principales: | , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
IEEE
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/fee43eca6be34d29960fc9fe0bfc104f |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:fee43eca6be34d29960fc9fe0bfc104f |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:fee43eca6be34d29960fc9fe0bfc104f2021-12-02T00:00:14ZExploring Cortex-M Microarchitectural Side Channel Information Leakage2169-353610.1109/ACCESS.2021.3124761https://doaj.org/article/fee43eca6be34d29960fc9fe0bfc104f2021-01-01T00:00:00Zhttps://ieeexplore.ieee.org/document/9598930/https://doaj.org/toc/2169-3536The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, cryptographic implementations. Such implementations, however, are microarchitecture-specific, and cannot be implemented without an in-depth structural knowledge of the CPU and memory information leakage patterns; a description of such information leakages is presently not disclosed by any processor design company. In this work we propose the first Instruction Set Architecture (ISA) level framework for microarchitectural leakage characterization. Our framework allows to extract a microarchitectural leakage profile from a superscalar in-order processor; we infer detailed pipeline characteristics through the observation of instruction execution timings, and provide an identification of the datapath registers via a side-channel measuring setup. The extracted model can serve as a foundation for building solid countermeasures against side-channel attacks on software cryptographic implementations. We validate the extracted models on the ARM Cortex-M4 and ARM Cortex-M7 CPUs, two of the most widespread ARM microcontroller cores. Finally, as a further validation of the effectiveness of our derived model, we mount a successful attack on unprotected AES implementations for each of the examined platforms.Alessandro BarenghiLuca BreveglieriNiccolo IzzoGerardo PelosiIEEEarticleComputer securitycorrelation power analysisembedded systems securitymicroarchitectural reverse engineeringside channel attack countermeasuresElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENIEEE Access, Vol 9, Pp 156507-156527 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Computer security correlation power analysis embedded systems security microarchitectural reverse engineering side channel attack countermeasures Electrical engineering. Electronics. Nuclear engineering TK1-9971 |
spellingShingle |
Computer security correlation power analysis embedded systems security microarchitectural reverse engineering side channel attack countermeasures Electrical engineering. Electronics. Nuclear engineering TK1-9971 Alessandro Barenghi Luca Breveglieri Niccolo Izzo Gerardo Pelosi Exploring Cortex-M Microarchitectural Side Channel Information Leakage |
description |
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, cryptographic implementations. Such implementations, however, are microarchitecture-specific, and cannot be implemented without an in-depth structural knowledge of the CPU and memory information leakage patterns; a description of such information leakages is presently not disclosed by any processor design company. In this work we propose the first Instruction Set Architecture (ISA) level framework for microarchitectural leakage characterization. Our framework allows to extract a microarchitectural leakage profile from a superscalar in-order processor; we infer detailed pipeline characteristics through the observation of instruction execution timings, and provide an identification of the datapath registers via a side-channel measuring setup. The extracted model can serve as a foundation for building solid countermeasures against side-channel attacks on software cryptographic implementations. We validate the extracted models on the ARM Cortex-M4 and ARM Cortex-M7 CPUs, two of the most widespread ARM microcontroller cores. Finally, as a further validation of the effectiveness of our derived model, we mount a successful attack on unprotected AES implementations for each of the examined platforms. |
format |
article |
author |
Alessandro Barenghi Luca Breveglieri Niccolo Izzo Gerardo Pelosi |
author_facet |
Alessandro Barenghi Luca Breveglieri Niccolo Izzo Gerardo Pelosi |
author_sort |
Alessandro Barenghi |
title |
Exploring Cortex-M Microarchitectural Side Channel Information Leakage |
title_short |
Exploring Cortex-M Microarchitectural Side Channel Information Leakage |
title_full |
Exploring Cortex-M Microarchitectural Side Channel Information Leakage |
title_fullStr |
Exploring Cortex-M Microarchitectural Side Channel Information Leakage |
title_full_unstemmed |
Exploring Cortex-M Microarchitectural Side Channel Information Leakage |
title_sort |
exploring cortex-m microarchitectural side channel information leakage |
publisher |
IEEE |
publishDate |
2021 |
url |
https://doaj.org/article/fee43eca6be34d29960fc9fe0bfc104f |
work_keys_str_mv |
AT alessandrobarenghi exploringcortexmmicroarchitecturalsidechannelinformationleakage AT lucabreveglieri exploringcortexmmicroarchitecturalsidechannelinformationleakage AT niccoloizzo exploringcortexmmicroarchitecturalsidechannelinformationleakage AT gerardopelosi exploringcortexmmicroarchitecturalsidechannelinformationleakage |
_version_ |
1718404021761343488 |