Effectiveness of defenses against profiling side-channel attacks
PúblicoContenido Descargable
open in viewerSide-channel attacks are commonly used to extract cryptographic keys from embedded systems. We study side-channel countermeasures originally designed to protect against differential power analysis (DPA) and determine how effective they are against profiling attacks using neural networks. We compiled two otherwise identical binaries that perform AES-256 encryption, one with DPA protections and one without. In our experiments, the binary with the countermeasures required 8 to 18 times as much attack data as the unprotected binary to achieve the same efficacy of attack, given the same amount of training data for both binaries. We conclude that our DPA protections may make profiling attacks time prohibitive in some cases but they are insufficient to completely defend against profiling attacks.
- This report represents the work of one or more WPI undergraduate students submitted to the faculty as evidence of completion of a degree requirement. WPI routinely publishes these reports on its website without editorial or peer review.
- Creator
- Subject
- Publisher
- Identifier
- 41201
- E-project-110821-150024
- Advisor
- Year
- 2021
- Date created
- 2021-11-08
- Resource type
- Major
- Rights statement
Las relaciones
- En Collection:
Elementos
Elementos
Miniatura | Título | Visibilidad | Embargo Release Date | Acciones |
---|---|---|---|---|
arobinson3_MQP_paper_11_8_2021.pdf | Público | Descargar |
Permanent link to this page: https://digital.wpi.edu/show/w9505335m