Efficient template attacks
View / Open Files
Authors
Choudary, Omar
Kuhn, Markus G.
Publication Date
2014Journal Title
Smart Card Research and Advanced Applications: 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers
Series
Lecture Notes in Computer Science
Publisher
Springer
Pages
253-270
Language
English
Type
Book or Book Chapter
Metadata
Show full item recordCitation
Choudary, O., & Kuhn, M. G. (2014). Efficient template attacks. https://www.repository.cam.ac.uk/handle/1810/245770
Description
This is the accepted manuscript version. The final published version is available from http://link.springer.com/chapter/10.1007/978-3-319-08302-5_17.
Abstract
Template attacks remain a powerful side-channel technique to eavesdrop on tamper-resistant hardware. They model the probability distribution of leaking signals and noise to guide a search for secret data values. In practice, several numerical obstacles can arise when implementing such attacks with multivariate normal distributions. We propose efficient methods to avoid these. We also demonstrate how to achieve significant performance improvements, both in terms of information extracted and computational cost, by pooling covariance estimates across all data values. We provide a detailed and systematic overview of many different options for implementing such attacks. Our experimental evaluation of all these methods based on measuring the supply current of a byte-load instruction executed in an unprotected 8-bit microcontroller leads to practical guidance for choosing an attack algorithm.
Sponsorship
Omar Choudary is a recipient of the Google Europe Fellowship in
Mobile Security, and this research is supported in part by this Google Fellowship.
Identifiers
External DOI: https://doi.org/10.1007/978-3-319-08302-5_17
This record's URL: https://www.repository.cam.ac.uk/handle/1810/245770