Power Contracts: Provably Complete Power Leakage Models for Processors

Roderick Bloem, Barbara Gigerl, Marc Gourjon, Vedad Hadzic*, Stefan Mangard, Robert Primas

*Korrespondierende/r Autor/-in für diese Arbeit

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

The protection of cryptographic software implementations against power-analysis attacks is critical for applications in embedded systems. A commonly used algorithmic countermeasure against these attacks is masking, a secret-sharing scheme that splits a sensitive computation into computations on multiple random shares.
In practice, the security of masking schemes relies on several assumptions that are often violated by microarchitectural side-effects of CPUs. Many past works address this problem by studying these leakage effects and building corresponding leakage models that can then be integrated into a software verification workflow. However, these models have only been derived empirically, putting in question the otherwise rigorous security statements made with verification.

We solve this problem in two steps.
First, we introduce a contract layer between the (CPU) hardware and the software that allows the specification of microarchitectural side-effects on masked software in an intuitive language.
Second, we present a method for proving the correspondence between contracts and CPU netlists to ensure the completeness of the specified leakage models.
Then, any further security proofs only need to happen between software and contract, which brings benefits such as reduced verification runtime, improved user experience, and the possibility of working with vendor-supplied contracts of CPUs whose design is not available on netlist-level due to IP restrictions.
We apply our approach to the popular RISC-V IBEX core, provide a corresponding formally verified contract, and describe how this contract could be used to verify masked software implementations.
Originalspracheenglisch
TitelCCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
Herausgeber (Verlag)Association of Computing Machinery
Seiten381-395
Seitenumfang15
ISBN (elektronisch)9781450394505
DOIs
PublikationsstatusVeröffentlicht - 7 Nov. 2022
Veranstaltung2022 ACM SIGSAC Conference on Computer and Communications Security: ACM CSS 2022 - Los Angeles, USA / Vereinigte Staaten
Dauer: 7 Nov. 202211 Nov. 2022

Publikationsreihe

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Konferenz

Konferenz2022 ACM SIGSAC Conference on Computer and Communications Security
KurztitelACM CSS 2022
Land/GebietUSA / Vereinigte Staaten
OrtLos Angeles
Zeitraum7/11/2211/11/22

ASJC Scopus subject areas

  • Software
  • Computernetzwerke und -kommunikation

Fingerprint

Untersuchen Sie die Forschungsthemen von „Power Contracts: Provably Complete Power Leakage Models for Processors“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren