Hardware accelerated smart-card software evaluation supported by information leakage and activity sensors

System integration density increased tremendously in recent years, resulting in various problems for designers. First, a variety of dependability issues were a direct consequence from high clock frequencies and system-on-chip complexity, such as thermal, power, and stability challenges. Furthermore, deep sub-micron semiconductor processes were increasingly prone to single-event-upsets and multiple-event-upsets caused by logic degradation and environmental sources. Besides these reliability issues, the intentional introduction of faults into the system by adversaries, is of increasing concern to system developers of smart-cards. Therefore, there is a strong need for hardware-accelerated evaluation techniques during the design phase to identify weaknesses in cryptographic software implementations. To map power and fault models to such FPGA-based evaluation systems, characterization and benchmark approaches are described in literature, using general purpose benchmark software. Unfortunately, such non-specialized software can lead to various evaluation problems. Therefore, this paper proposes an hardware-accelerated methodology for the investigation of software implementations in the security and dependability domains. The applicability of the approach has been shown using a general available system-on-chip implementation.

[1]  Eli Biham,et al.  Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.

[2]  Stefan Mangard,et al.  Power analysis attacks - revealing the secrets of smart cards , 2007 .

[3]  Anantha P. Chandrakasan,et al.  Low-power CMOS digital design , 1992 .

[4]  Daniel Shumow,et al.  Side Channel Leakage Profiling in Software , 2010 .

[5]  J. Grinschgl,et al.  System side-channel leakage emulation for HW/SW security coverification of MPSoCs , 2012, 2012 IEEE 15th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS).

[6]  Makoto Nagata,et al.  A fast power current analysis methodology using capacitor charging model for side channel attack evaluation , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.

[7]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[8]  Christian Steger,et al.  Hardware-Accelerated Workload Characterization for Power Modeling and Fault Injection , 2012, 2012 IEEE 21st Asian Test Symposium.

[9]  Christian Steger,et al.  Automated Power Characterization for Run-Time Power Emulation of SoC Designs , 2010, 2010 13th Euromicro Conference on Digital System Design: Architectures, Methods and Tools.

[10]  Stéphane Badel,et al.  A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions , 2009, CHES.

[11]  Alessandro Trifiletti,et al.  Testing power-analysis attack susceptibility in register-transfer level designs , 2007, IET Inf. Secur..

[12]  Patrick Schaumont,et al.  Early feedback on side-channel risks with accelerated toggle-counting , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.

[13]  Alessandro Trifiletti,et al.  High-Level Side-Channel Attack Modeling and Simulation for Security-Critical Systems on Chips , 2008, IEEE Transactions on Dependable and Secure Computing.

[14]  Moti Yung,et al.  A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..

[15]  Trevor Mudge,et al.  MiBench: A free, commercially representative embedded benchmark suite , 2001 .

[16]  Ingrid Verbauwhede,et al.  Simulation models for side-channel information leaks , 2005, Proceedings. 42nd Design Automation Conference, 2005..

[17]  Patrick Schaumont,et al.  A Component-Based Design Environment for ESL Design , 2006, IEEE Design & Test of Computers.

[18]  Erik P. de Vink,et al.  Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards , 2004, Formal Aspects in Security and Trust.