Projects per year
Abstract
In this paper, we overcome the current situation and present the first approach for co-design and co-verification of masked software implementations on CPUs. First, we present Coco, a tool that allows us to provide security proofs at the gate-level for the execution of a masked software implementation on a concrete CPU. Using Coco , we analyze the popular 32-bit RISC-V Ibex core, identify all design aspects that violate the security of our tested masked software implementations and perform corrections, mostly in hardware. The resulting secured Ibex core has an area overhead around 10%, the runtime of software on this core is largely unaffected, and the formal verification with Coco of an, e.g., first-order masked Keccak S-box running on the secured Ibex core takes around 156 seconds. To demonstrate the effectiveness of our suggested design modifications, we perform practical leakage assessments using an FPGA evaluation board.
Original language | English |
---|---|
Title of host publication | Proceedings of the 30th USENIX Security Symposium |
Publisher | USENIX Association |
Pages | 1469-1486 |
Number of pages | 18 |
ISBN (Electronic) | 9781939133243 |
Publication status | Published - 2021 |
Event | 30th USENIX Security Symposium: USENIX Security 2021 - Virtuell, Canada Duration: 11 Aug 2021 → 13 Aug 2021 |
Conference
Conference | 30th USENIX Security Symposium |
---|---|
Abbreviated title | USENIX Security '21 |
Country/Territory | Canada |
City | Virtuell |
Period | 11/08/21 → 13/08/21 |
Fingerprint
Dive into the research topics of 'Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs'. Together they form a unique fingerprint.Projects
- 5 Finished
-
FERMION - Formal Verification of Masked Hardware Implementations
Bloem, R. (Co-Investigator (CoI))
2/01/19 → 1/01/22
Project: Research project
-
IoT4CPS - Trustworthy IoT for Cyber-Physical-Systems
Mangard, S. (Co-Investigator (CoI)) & Römer, K. U. (Co-Investigator (CoI))
1/12/17 → 30/11/20
Project: Research project
-
Dessnet - Dependable, secure and time-aware sensor networks
Mangard, S. (Co-Investigator (CoI)), Glanzer, C. (Co-Investigator (CoI)), Görtschacher, L. J. (Co-Investigator (CoI)), Bösch, W. (Co-Investigator (CoI)), Grosinger, J. (Co-Investigator (CoI)), Fischbacher, R. B. (Co-Investigator (CoI)), Deutschmann, B. (Co-Investigator (CoI)) & Shetty, D. (Co-Investigator (CoI))
1/06/17 → 31/05/21
Project: Research project
Research output
- 2 Conference paper
-
Power Contracts: Provably Complete Power Leakage Models for Processors
Bloem, R., Gigerl, B., Gourjon, M., Hadzic, V., Mangard, S. & Primas, R., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association of Computing Machinery, p. 381-395 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).Research output: Chapter in Book/Report/Conference proceeding › Conference paper › peer-review
Open Access -
CocoAlma: A Versatile Masking Verifier
Hadzic, V. & Bloem, R., 9 Jul 2021, Proceedings of the 21st Formal Methods in Computer-Aided Design, FMCAD 2021. Piskac, R., Whalen, M. W., Hunt, W. A. & Weissenbacher, G. (eds.). p. 14-23 10 p. (Proceedings of the 21st Formal Methods in Computer-Aided Design, FMCAD 2021).Research output: Chapter in Book/Report/Conference proceeding › Conference paper › peer-review
Open AccessFile