A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs

作者: Fu Song , Taolue Chen , Pengfei Gao , Hongyi Xie

DOI: 10.1145/3428015

关键词: Formal verificationComputer scienceSpurious relationshipSecrecyCryptographyType inferenceArithmeticCountermeasure (computer)ImplementationSide channel attack

摘要: Side-channel attacks, which are capable of breaking secrecy via side-channel information, pose a growing threat to the implementation cryptographic algorithms. Masking is an effective countermeasure against attacks by removing statistical dependence between and power consumption randomization. However, designing efficient masked implementations turns out be error-prone task. Current techniques for verifying whether programs secure limited in their applicability accuracy, especially when they applied. To bridge this gap, article, we first propose sound type system, equipped with inference algorithm, arithmetic higher-order attacks. We then give novel model-counting-based pattern-matching-based methods that able precisely determine potential leaky observable sets detected system genuine or simply spurious. evaluate our approach on various programs. The experiments confirm outperforms state-of-the-art baselines terms applicability, efficiency.

参考文章(97)
HeeSeok Kim, Seokhie Hong, Jongin Lim, A fast and provably secure higher-order masking of AES S-box cryptographic hardware and embedded systems. pp. 95- 107 ,(2011) , 10.1007/978-3-642-23951-9_7
Hassan Eldib, Chao Wang, Patrick Schaumont, SMT-Based Verification of Software Countermeasures against Side-Channel Attacks Tools and Algorithms for the Construction and Analysis of Systems. pp. 62- 77 ,(2014) , 10.1007/978-3-642-54862-8_5
Jean-Sébastien Coron, Johann Großschädl, Praveen Kumar Vadnala, Secure Conversion between Boolean and Arithmetic Masking of Any Order cryptographic hardware and embedded systems. pp. 188- 205 ,(2014) , 10.1007/978-3-662-44709-3_11
Stefan Mangard, Hardware Countermeasures Against DPA – A Statistical Analysis of Their Effectiveness the cryptographers track at the rsa conference. pp. 222- 235 ,(2004) , 10.1007/978-3-540-24660-2_18
Gilles Barthe, Boris Köpf, Laurent Mauborgne, Martín Ochoa, Leakage Resilience against Concurrent Cache Attacks principles of security and trust. pp. 140- 158 ,(2014) , 10.1007/978-3-642-54792-8_8
Ali Galip Bayrak, Francesco Regazzoni, David Novo, Paolo Ienne, Sleuth: Automated Verification of Software Power Analysis Countermeasures Cryptographic Hardware and Embedded Systems - CHES 2013. pp. 293- 310 ,(2013) , 10.1007/978-3-642-40349-1_17
Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner, Matthieu Rivain, Praveen Kumar Vadnala, Conversion of security proofs from one leakage model to another: a new issue international workshop constructive side-channel analysis and secure design. pp. 69- 81 ,(2012) , 10.1007/978-3-642-29912-4_6
Johannes Blömer, Jorge Guajardo, Volker Krummel, Provably Secure Masking of AES Selected Areas in Cryptography. pp. 69- 83 ,(2004) , 10.1007/978-3-540-30564-4_5
Boris Köpf, Laurent Mauborgne, Martín Ochoa, Automatic Quantification of Cache Side-Channels Computer Aided Verification. pp. 564- 580 ,(2012) , 10.1007/978-3-642-31424-7_40
Hassan Eldib, Chao Wang, Synthesis of Masking Countermeasures against Side Channel Attacks computer aided verification. pp. 114- 130 ,(2014) , 10.1007/978-3-319-08867-9_8