ebook img

Constructive Side-Channel Analysis and Secure Design: 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12, 2022, Proceedings PDF

279 Pages·2022·23.825 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Constructive Side-Channel Analysis and Secure Design: 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12, 2022, Proceedings

Josep Balasch Colin O’Flynn (Eds.) Constructive 1 1 2 Side-Channel Analysis 3 1 S C and Secure Design N L 13th International Workshop, COSADE 2022 Leuven, Belgium, April 11–12, 2022 Proceedings Lecture Notes in Computer Science 13211 FoundingEditors GerhardGoos KarlsruheInstituteofTechnology,Karlsruhe,Germany JurisHartmanis CornellUniversity,Ithaca,NY,USA EditorialBoardMembers ElisaBertino PurdueUniversity,WestLafayette,IN,USA WenGao PekingUniversity,Beijing,China BernhardSteffen TUDortmundUniversity,Dortmund,Germany GerhardWoeginger RWTHAachen,Aachen,Germany MotiYung ColumbiaUniversity,NewYork,NY,USA Moreinformationaboutthisseriesathttps://link.springer.com/bookseries/558 · Josep Balasch Colin O’Flynn (Eds.) Constructive Side-Channel Analysis and Secure Design 13th International Workshop, COSADE 2022 Leuven, Belgium, April 11–12, 2022 Proceedings Editors JosepBalasch ColinO’Flynn KULeuven DalhousieUniversity Leuven,Belgium Halifax,NS,Canada ISSN 0302-9743 ISSN 1611-3349 (electronic) LectureNotesinComputerScience ISBN 978-3-030-99765-6 ISBN 978-3-030-99766-3 (eBook) https://doi.org/10.1007/978-3-030-99766-3 ©TheEditor(s)(ifapplicable)andTheAuthor(s),underexclusivelicense toSpringerNatureSwitzerlandAG2022 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow knownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbookare believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictionalclaimsin publishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Preface The 13th International Workshop on Constructive Side-Channel Analysis and Secure Design(COSADE2022),washeldinLeuven,Belgium,duringApril11–12,2022.The COSADEseriesofworkshopsbeganin2010andprovidesawell-establishedinterna- tional platform for researchers, academics, and industry participants to present their currentresearchtopicsinimplementationattacks,secureimplementation,implementa- tionattack-resilientarchitecturesandschemes,securedesignandevaluation,practical attacks,testplatforms,andopenbenchmarks. COSADE 2022 was organized by KU Leuven. This year, the workshop received 25 papers from authors in 14 countries. Each paper was reviewed in a double-blind peer-review process by four Program Committee members. The Program Committee included 31 members from 15 countries, selected among experts from academia and industryintheareasofsecuredesign,sidechannelattacksandcountermeasures,fault injection attacks, efficient implementations, and architectures and protocols. Overall, theProgramCommitteereturned94reviewswiththehelpof11additionalreviewers. Duringthedecisionprocess,12paperswereselectedforpublication.Thesemanuscripts are contained in these proceedings and the corresponding presentations were part of the COSADE 2022 program. We would like to express our gratitude to the Program Committee members for their timely reviews, their active participation in the paper discussionphase,andtheirwillingnesstocontributetotheshepherdingofconditionally acceptedpapers. Inadditiontothe12presentations ofselectedpapers,theprogramwascompleted bytwokeynotesandanindustrialsession.Thefirstkeynoteentitled“Abstractionsand ToolingforLeakageEvaluation”wasgivenbyDanPagefromtheUniversityofBristol. ThetalkgaveanoverviewofsupportforcryptographyontheRISC-VISA,aswellas currentresearchdirectionsrelatedtotoolingforhigh-levelleakageevaluationtasks.The secondkeynoteentitled“RepurposingWirelessStacksforIn-DepthSecurityAnalysis” wasgivenbyJiskaClassenfromtheSecureMobileNetworkingLabatTUDarmstadt. The talk presented recent research related to the exploration of closed-source wire- less ecosystems, and demonstrated practical tools and discovered vulnerabilities. The industrial session included three talks from industry players in the field of hardware security. Wewouldliketothankthegeneralchair,BenediktGierlichs,andthelocalorganizers ofKULeuvenfortheorganization,whichmadethisworkshopamemorableevent.We areverygratefulforthefinancialsupportreceivedfromourgeneroussponsorsRiscure, Secure-IC,NewAETechnology,PQShield,Rambus,Texplained,andNXP.Wewould also like to thank the authors who submitted their work to COSADE 2022, without whomtheworkshopwouldnothavebeenpossible. April2022 JosepBalasch ColinO’Flynn Organization SteeringCommittee Jean-LucDanger TélécomParisTech,France WernerSchindler BundesamtfürSicherheitinder Informationstechnik(BSI),Germany GeneralChair BenediktGierlichs KULeuven,Belgium ProgramCommitteeChairs ColinO’Flynn NewAETechnologyInc.,Canada JosepBalasch KULeuven,Belgium ProgramCommittee DiegoF.Aranha AarhusUniversity,Denmark VictorArribas RambusCryptographyResearch,TheNetherlands AlessandroBarenghi PolitecnicodiMilano,Italy ShivamBhasin NanyangTechnologicalUniversity,Singapore JakubBreier SiliconAustriaLabs,Austria OlivierBronchain UniversitéCatholiquedeLouvain,Belgium ChitchanokChuengsatiansup UniversityofAdelaide,Australia FabrizioDeSantis SiemensAG,Germany Jean-MaxDutertre EcoleNationaleSuperieuredesMinesde Saint-Étienne(ENSMSE),France WielandFischer InfineonTechnologies,Germany FatemehGanji WorcesterPolytechnicInstitute,USA AnnelieHeuser CNRS/IRISA,France JohannHeyszl FraunhoferAISEC,Germany NaofumiHomma TohokuUniversity,Japan Jens-PeterKaps GeorgeMasonUniversity,USA JulianeKrämer UniversityofRegensburg,Germany VictorLomne NinjaLab,France PatrickLonga MicrosoftResearch,USA RoelMaes IntrinsicID,TheNetherlands MarcelMedwed NXPSemiconductors,Austria viii Organization ThorbenMoos UniversitéCatholiquedeLouvain,Belgium DanielPage UniversityofBristol,UK MichaelPehl TechnicalUniversityofMunich,Germany StjepanPicek DelftUniversityofTechnology,TheNetherlands ChesterRebeiro IndianInstituteofTechnologyMadras,India FrancescoRegazzoni UniversityofAmsterdam,TheNetherlands,and UniversitàdellaSvizzeraitaliana,Switzerland SujoySinhaRoy TUGraz,Austria MarcStöttinger RheinMainUniversityofAppliedSciences, Germany RuggeroSusella STMicroelectronics,Italy LennertWouters KULeuven,Belgium FanZhang ZhejiangUniversity,China AdditionalReviewers ReetwikDas MartinRehberg LukasGiner ThomasSchamberger MustafaKhairallah NikhileshSingh SoundesMarzougui TimMusic EmanueleStrieder AntoonPurnal LarsTebelmann Contents Machine/DeepLearning Machine-Learning Assisted Side-Channel Attacks on RNS ECC ImplementationsUsingHybridFeatureEngineering ........................ 3 NailaMukhtar,LouizaPapachristodoulou,ApostolosP.Fournaris, LejlaBatina,andYinanKong FocusisKeytoSuccess:AFocalLossFunctionforDeepLearning-Based Side-ChannelAnalysis ................................................. 29 MaikelKerkhof,LichaoWu,GuilhermePerin,andStjepanPicek OntheEvaluationofDeepLearning-BasedSide-ChannelAnalysis ........... 49 LichaoWu,GuilhermePerin,andStjepanPicek ToolsandReferences ASecondLookattheASCADDatabases ................................. 75 MaximilianEgger, ThomasSchamberger, LarsTebelmann, FlorianLippert,andGeorgSigl FIPAC:ThwartingFault-andSoftware-InducedControl-FlowAttacks withARMPointerAuthentication ....................................... 100 RobertSchilling,PascalNasahl,andStefanMangard BodyBiasingInjection:ToThinorNottoThintheSubstrate? ............... 125 G.Chancel,J.-M.Galliere,andP.Maurine Attacks On the Susceptibility of Texas Instruments SimpleLink Platform MicrocontrollerstoNon-invasivePhysicalAttacks ......................... 143 LennertWouters,BenediktGierlichs,andBartPreneel Single-TraceClusteringPowerAnalysisofthePoint-SwappingProcedure intheThreePointLadderofCortex-M4SIKE ............................. 164 - AymericGenêtandNovakKaluderovic´ CanonicalDPAAttackonHMAC-SHA1/SHA2 ........................... 193 FrankSchuhmacher x Contents Masking ProvableSecureSoftwareMaskingintheReal-World ...................... 215 ArthurBeckers,LennertWouters,BenediktGierlichs,BartPreneel, andIngridVerbauwhede SystematicStudyofDecryptionandRe-encryptionLeakage:TheCase ofKyber ............................................................. 236 MelissaAzouaoui, OlivierBronchain, ClémentHoffmann, YuliaKuzovkova,TobiasSchneider,andFrançois-XavierStandaert Handcrafting:ImprovingAutomatedMaskinginHardwarewithManual Optimizations ......................................................... 257 CharlesMomin,GaëtanCassiers,andFrançois-XavierStandaert AuthorIndex ......................................................... 277

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.