학술논문

Entropy-Shield:Side-Channel Entropy Maximization for Timing-based Side-Channel Attacks
Document Type
Conference
Source
2020 21st International Symposium on Quality Electronic Design (ISQED) Quality Electronic Design (ISQED), 2020 21st International Symposium on. :161-166 Mar, 2020
Subject
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
General Topics for Engineers
Photonics and Electrooptics
Power, Energy and Industry Applications
Software architecture
Perturbation methods
Data integrity
Side-channel attacks
Entropy
Hardware
Encryption
Side-Channel Attack (SCA)
hardware-security
Language
Abstract
The hardware systems have experienced a plethora of side-channel attacks (SCAs) in recent years with cache-based SCAs being one of the dominant threats. The SCAs exploit the architectural caveats, which invariably leak essential information during an application's execution. Shutting down the side-channels is not a feasible approach due to various restrictions, such as architectural changes and complexity. To overcome such concerns and protect the data integrity, we introduce Entropy-Shield in this work. The proposed Entropy-Shield aims to maximize the entropy in the leaked side-channel information rather than attempting to close the side-channels. To achieve this, the proposed Entropy-Shield introduces carefully and sensibly crafted perturbations into the victim application, thereby increasing the entropy of the information obtained by the attacker to deduce the secret key, while the information being observed looks legit yet futile. This methodology has been successfully tested on cache targeted SCAs such as Flush+Reload and Flush+Flush and the key information retrieved by the attacker is shown to be ultimately futile, indicating the success of proposed Entropy-Shield.