Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/136025
Type: Thesis
Title: Towards Automatic Power Analysis Leakage Elimination
Author: Shelton, Madura Anushanga
Issue Date: 2022
School/Discipline: School of Computer Science
Abstract: Side channel attacks were first described on timing based information leakage in 1996 by Paul Kocher. Similar leakage can also be observed through physical properties such as electro-magnetic emanations, acoustics and power consumption. Masking is a countermeasure that splits sensitive values into separate values called shares. However, due to the existence of unintended interactions in hardware, masked implementations may fail to reach their advertised security level. We propose an emulation based approach to find and eliminate leakage caused by unintended interactions. This thesis presents three main contributions, ELMO*, Rosita and Rosita++. ELMO* is a modified version of ELMO (McCann et al. USENIX Security 2017) which can emulate leakage from unintended interactions realistically. Rosita and Rosita++ are two code rewriting tools that can fix univariate and multivariate leakage by using emulated leakage from ELMO*. We tested Rosita on first-order masked implementations of AES, ChaCha and Xoodoo and the slowdown incurred by the fixes were 21.3%, 75% and 32.3%. Rosita eliminated more than 90% of all observed leakage on a STM32F030 Discovery Evaluation board. We evaluated Rosita++ on second-order masked implementations of Boolean-to-arithmetic masking, PRESENT and Xoodoo where it eliminated all leakage in Boolean-to-arithmetic and Xoodoo implementations. The slowdown incurred by fixes applied were 36%, 29% and 189%. It was also evaluated on a third-order masked synthetic example using 30 million power traces recorded from the target device, where Rosita++ fixed all detected leakage. Our contributions have been presented at NDSS 2021 and CCS 2021 conferences.
Advisor: Wagner, Markus
Yarom, Yuval
Dissertation Note: Thesis (Ph.D.) -- University of Adelaide, School of Computer Science, 2022
Keywords: Power analysis
Side-channel attacks
Hardware security
Automatic countermeasures
Provenance: This electronic version is made publicly available by the University of Adelaide in accordance with its open access policy for student theses. Copyright in this thesis remains with the author. This thesis may incorporate third party material which has been used by the author pursuant to Fair Dealing exceptions. If you are the owner of any included third party copyright material you wish to be removed from this electronic version, please complete the take down form located at: http://www.adelaide.edu.au/legals
Appears in Collections:Research Theses

Files in This Item:
File Description SizeFormat 
Shelton2022_PhD.pdf15.48 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.