A Tale of Resilience: On the Practical Security of Masked Software Implementations

Masking constitutes a provably-secure approach against side-channel attacks. However, recombination effects (e.g., transitions) severely reduce the proven security. Concerning the software domain, CPU microarchitectures encompass techniques improving the execution performances. Several studies show...

Full description

Bibliographic Details
Main Authors: Lorenzo Casalino, Nicolas Belleville, Damien Courousse, Karine Heydemann
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10192386/
_version_ 1797243519802277888
author Lorenzo Casalino
Nicolas Belleville
Damien Courousse
Karine Heydemann
author_facet Lorenzo Casalino
Nicolas Belleville
Damien Courousse
Karine Heydemann
author_sort Lorenzo Casalino
collection DOAJ
description Masking constitutes a provably-secure approach against side-channel attacks. However, recombination effects (e.g., transitions) severely reduce the proven security. Concerning the software domain, CPU microarchitectures encompass techniques improving the execution performances. Several studies show that such techniques induce recombination effects. Furthermore, these techniques implicitly induce some form of parallelism, and the potential associated threat has never been investigated. In addition, the practical security of masking relies on the chosen masking scheme. Few works analysed the security of software protected by different masking schemes, and none considered the parallelism threat. Thus, literature lacks of a more comprehensive investigation on the practical security of software implementations relying on various masking schemes in presence of micro-architecture-induced recombination effects and parallelism. This work performs a first step to fill this gap. Specifically, we evaluate the practical security offered by first-order Boolean, arithmetic-sum and inner-product masking against transitions and parallelism in software. We firstly assess the presence of transition and parallel-based leakages in software. Secondly, we evaluate the security of the encodings of the selected masking schemes with respect to each leakage source via micro-benchmarks. Thirdly, we assess the practical security of different AES-128 software implementations, one for each selected masking scheme. We carry out the investigation on the STM32F215 and STM32F303 micro-controllers. We show that 1) CPU’s parallel features allow successful attacks against masked implementations resistant to transition-based leakages; 2) implementation choices (e.g., finite field multiplication) impact on the practical security of masked software implementations in presence of recombination effects.
first_indexed 2024-04-24T18:56:25Z
format Article
id doaj.art-9b8273b2cb914655942ba5e44f713529
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-04-24T18:56:25Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-9b8273b2cb914655942ba5e44f7135292024-03-26T17:34:43ZengIEEEIEEE Access2169-35362023-01-0111846518466910.1109/ACCESS.2023.329843610192386A Tale of Resilience: On the Practical Security of Masked Software ImplementationsLorenzo Casalino0https://orcid.org/0009-0005-4195-8850Nicolas Belleville1https://orcid.org/0000-0001-7634-5767Damien Courousse2https://orcid.org/0000-0003-2761-3627Karine Heydemann3Univ. Grenoble Alpes, CEA, List, Grenoble, FranceUniv. Grenoble Alpes, CEA, List, Grenoble, FranceUniv. Grenoble Alpes, CEA, List, Grenoble, FranceThales DIS, Meyreuil, FranceMasking constitutes a provably-secure approach against side-channel attacks. However, recombination effects (e.g., transitions) severely reduce the proven security. Concerning the software domain, CPU microarchitectures encompass techniques improving the execution performances. Several studies show that such techniques induce recombination effects. Furthermore, these techniques implicitly induce some form of parallelism, and the potential associated threat has never been investigated. In addition, the practical security of masking relies on the chosen masking scheme. Few works analysed the security of software protected by different masking schemes, and none considered the parallelism threat. Thus, literature lacks of a more comprehensive investigation on the practical security of software implementations relying on various masking schemes in presence of micro-architecture-induced recombination effects and parallelism. This work performs a first step to fill this gap. Specifically, we evaluate the practical security offered by first-order Boolean, arithmetic-sum and inner-product masking against transitions and parallelism in software. We firstly assess the presence of transition and parallel-based leakages in software. Secondly, we evaluate the security of the encodings of the selected masking schemes with respect to each leakage source via micro-benchmarks. Thirdly, we assess the practical security of different AES-128 software implementations, one for each selected masking scheme. We carry out the investigation on the STM32F215 and STM32F303 micro-controllers. We show that 1) CPU’s parallel features allow successful attacks against masked implementations resistant to transition-based leakages; 2) implementation choices (e.g., finite field multiplication) impact on the practical security of masked software implementations in presence of recombination effects.https://ieeexplore.ieee.org/document/10192386/Maskingprocessor micro-architectureside-channel analysissoftware masking
spellingShingle Lorenzo Casalino
Nicolas Belleville
Damien Courousse
Karine Heydemann
A Tale of Resilience: On the Practical Security of Masked Software Implementations
IEEE Access
Masking
processor micro-architecture
side-channel analysis
software masking
title A Tale of Resilience: On the Practical Security of Masked Software Implementations
title_full A Tale of Resilience: On the Practical Security of Masked Software Implementations
title_fullStr A Tale of Resilience: On the Practical Security of Masked Software Implementations
title_full_unstemmed A Tale of Resilience: On the Practical Security of Masked Software Implementations
title_short A Tale of Resilience: On the Practical Security of Masked Software Implementations
title_sort tale of resilience on the practical security of masked software implementations
topic Masking
processor micro-architecture
side-channel analysis
software masking
url https://ieeexplore.ieee.org/document/10192386/
work_keys_str_mv AT lorenzocasalino ataleofresilienceonthepracticalsecurityofmaskedsoftwareimplementations
AT nicolasbelleville ataleofresilienceonthepracticalsecurityofmaskedsoftwareimplementations
AT damiencourousse ataleofresilienceonthepracticalsecurityofmaskedsoftwareimplementations
AT karineheydemann ataleofresilienceonthepracticalsecurityofmaskedsoftwareimplementations
AT lorenzocasalino taleofresilienceonthepracticalsecurityofmaskedsoftwareimplementations
AT nicolasbelleville taleofresilienceonthepracticalsecurityofmaskedsoftwareimplementations
AT damiencourousse taleofresilienceonthepracticalsecurityofmaskedsoftwareimplementations
AT karineheydemann taleofresilienceonthepracticalsecurityofmaskedsoftwareimplementations