SlideShare a Scribd company logo
1 of 78
Download to read offline
SESSION ID:SESSION ID:
#RSAC
Yu Yu
Ridge-based Profiled Differential Power
Analysis
CRYP-F01
Research Professor
Shanghai Jiao Tong University
#RSAC
Outline
2
Introduction
(Profiled) Differential power analysis
Profiling phase
Exploitation phase
Our contributions
Ridge-based profiling
Theoretical analysis
Why and how is ridge-based profiling better?
How the coefficients shrink in the ridge-based profiling?
Experimental Results
Simulation-based experiments
Experiments on real FPGA implementation
#RSAC
Outline
3
Introduction
(Profiled) Differential power analysis
Profiling phase
Exploitation phase
Our contributions
Ridge-based profiling
Theoretical analysis
Why and how is ridge-based profiling better?
How the coefficients shrink in the ridge-based profiling?
Experimental Results
Simulation-based experiments
Experiments on real FPGA implementation
#RSAC
(profiled) Difference power analysis
4
Two phases:
profiling
Exploitation
Leakage of :
L(·) is leakage function
Power model :
xz
L( )z xT z
M()
M( ) L( )x xz z
M( )z xT z
#RSAC
Outline
5
Introduction
(Profiled) Differential power analysis
Profiling phase
Exploitation phase
Our contributions
Ridge-based profiling
Theoretical analysis
Why and how is ridge-based profiling better?
How the coefficients shrink in the ridge-based profiling?
Experimental Results
Simulation-based experiments
Experiments on real FPGA implementation
#RSAC
Classical profiling
6
The leakage follows Gaussian distribution:
For each intermediate variable z: The adversary finds sample mean
and the sample covariance .
Sample mean is obtained by averaging the power consumptions
corresponding to intermediate variable z.
To accelerate the profiling: we can assume the sample covariance
are identical for all the intermediate variable.
z zM( ) (N ), µz
z
ˆµ
z
ˆ
z
ˆ
#RSAC
LR-based profiling
7
#RSAC
LR-based profiling
8
#RSAC
Pro and con of LR-based profiling
9
#RSAC
Outline
10
Introduction
(Profiled) Differential power analysis
Profiling phase
Exploitation phase
Our contributions
Ridge-based profiling
Theoretical analysis
Why and how is ridge-based profiling better?
How the coefficients shrink in the ridge-based profiling?
Experimental Results
Simulation-based experiments
Experiments on real FPGA implementation
#RSAC
Exploitation phases
11
#RSAC
Outline
12
Introduction
(Profiled) Differential power analysis
Profiling phase
Exploitation phase
Our contributions
Ridge-based profiling
Theoretical analysis
Why and how is ridge-based profiling better?
How the coefficients shrink in the ridge-based profiling?
Experimental Results
Simulation-based experiments
Experiments on real FPGA implementation
#RSAC
Our contributions
13
(to mitigate the overfitting issue) New profiling method based on
ridge-regression
An optimized parameter find method based on cross-validation
Theoretical analysis of the new method’s improvement
Simulation based and practical experiments
#RSAC
Outline
14
Introduction
(Profiled) Differential power analysis
Profiling phase
Exploitation phase
Our contributions
Ridge-based profiling
Theoretical analysis
Why and how is ridge-based profiling better?
How the coefficients shrink in the ridge-based profiling?
Experimental Results
Simulation-based experiments
Experiments on real FPGA implementation
#RSAC
Construction of ridge-based profiling
15
#RSAC
Parameter optimization
16
#RSAC
Optimized parameter is related to the noise level
17
simulation-based experiment
trace number = 2000
#RSAC
Outline
18
Introduction
(Profiled) Differential power analysis
Profiling phase
Exploitation phase
Our contributions
Ridge-based profiling
Theoretical analysis
Why and how is ridge-based profiling better?
How the coefficients shrink in the ridge-based profiling?
Experimental Results
Simulation-based experiments
Experiments on real FPGA implementation
#RSAC
Variance of the coefficients
19
#RSAC
Variance of the coefficients
20
Figure: The variances of the coefficients for degrees (of the model) and λ. The
left and right figures correspond to the cases for d = 1 and d = 2 respectively.
#RSAC
Variance of the coefficients
21
Figure: The variances of the coefficients for degrees (of the model) and λ. The
left and right figures correspond to the cases for d = 4 and d = 8 respectively.
#RSAC
Outline
22
Introduction
(Profiled) Differential power analysis
Profiling phase
Exploitation phase
Our contributions
Ridge-based profiling
Theoretical analysis
Why and how is ridge-based profiling better?
How the coefficients shrink in the ridge-based profiling?
Experimental Results
Simulation-based experiments
Experiments on real FPGA implementation
#RSAC
How the coefficients shrink in the ridge-based
profiling?
23
#RSAC
Outline
24
Introduction
(Profiled) Differential power analysis
Profiling phase
Exploitation phase
Our contributions
Ridge-based profiling
Theoretical analysis
Why and how is ridge-based profiling better?
How the coefficients shrink in the ridge-based profiling?
Experimental Results
Simulation-based experiments
Experiments on real FPGA implementation
#RSAC
Setup
25
Profiling methods:
ridge-based profiling
LR-based profiling
classical profiling
Target intermediate variable: output of AES-128’s first S-box of the
first round.
Univariate leakage.
Different degrees and randomized coefficients.
Metrics: perceived Information, guessing entropy.
#RSAC
A comparison of different profilings for leakage
degree 8
26
#RSAC
A comparison of different profilings for leakage
degree 4
27
#RSAC
A comparison of different profilings for leakage
degree 1
28
#RSAC
A comparison of different profilings for with
‘conservatively’ degree of model
29
The adversary may have no knowledge about the actual degree of the
leakage function.
He can use the model whose degree is higher than the one of the
leakage function.
We simulate the traces with leakage functions of degrees 1 and 2 and
then conduct the above experiments assuming a model of degree 4
for profiling.
#RSAC
Degrees of leakage function and model are 1 and
4 respectively
30
#RSAC
Degrees of leakage function and model are 2 and
4 respectively
31
#RSAC
Outline
32
Introduction
(Profiled) Differential power analysis
Profiling phase
Exploitation phase
Our contributions
Ridge-based profiling
Theoretical analysis
Why and how is ridge-based profiling better?
How the coefficients shrink in the ridge-based profiling?
Experimental Results
Simulation-based experiments
Experiments on real FPGA implementation
#RSAC
Practical experiments
33
test board:
SAKURA-X
oscilloscope:
LeCroy
waverunner
610Zi
#RSAC
First setting
34
#RSAC
Second setting (robust profiling)
35
#RSAC
Summary
36
Ridge-based profiling can save significant factors in the number of traces
they need to build a satisfying leakage model:
Better performance for nonlinear leakage functions.
Time complexity: equal to the one of LR-based profiling.
Robust profiling.
#RSAC
37
THANK YOU
Question?
SESSION ID:SESSION ID:
#RSAC
Si Gao
My Traces Learn What You Did in the
Dark: Recovering Secret Signals without
Key Guesses
CRYP-F01
PhD Student
Trusted Computing and Information Assurance Laboratory Institute of Software,
Chinese Academy of Sciences
#RSAC
Outline
Applications in SCA
ICA-based signal recovery
Preliminaries
Introduction
Summary
#RSAC
Outline
Applications in SCA
ICA-based signal recovery
Preliminaries
Introduction
Summary
#RSAC
Introduction
Side Channel Analysis (SCA)
Exploit the computation leakages
— Leakages depend on the intermediate state
#RSAC
Introduction
Traditional SCA flow (Non-profiled)
Guess-and-determine
— Step 1: take a key guess
Eve
Encryption Algorithm
Plaintext
k1
k2
k3
.
.
.
kr
Key Guess List Signal List
.
.
.
.
Actual
Leakage
Most likely key
guess k
 1 1 1
(1),..., ( )k k kx x Tx
 2 2 2
(1),..., ( )k k kx x Tx
 (1),..., ( )r r rk k kx x Tx
 (1),..., ( )l l Tl
Intermediate States
(Assumed)
Leakage
Model
M
Expected
Leakages
   1 1 1
= ( (1)),..., ( ( ))k k kM M M Tx x x
   2 1 1
= ( (1)),..., ( ( ))k k kM M M Tx x x
   = ( (1)),..., ( ( ))r r rk k kM M M Tx x x
.
.
.
.
#RSAC
Introduction
Traditional SCA flow (Non-profiled)
Guess-and-determine
— Step 2: Compute the intermediate states from T plaintexts and the key guess
 Eg. The output of an AES Sbox, x=S(p⊕kg)
Eve
Encryption Algorithm
Plaintext
k1
k2
k3
.
.
.
kr
Key Guess List Signal List
.
.
.
.
Actual
Leakage
Most likely key
guess k
 1 1 1
(1),..., ( )k k kx x Tx
 2 2 2
(1),..., ( )k k kx x Tx
 (1),..., ( )r r rk k kx x Tx
 (1),..., ( )l l Tl
Intermediate States
(Assumed)
Leakage
Model
M
Expected
Leakages
   1 1 1
= ( (1)),..., ( ( ))k k kM M M Tx x x
   2 1 1
= ( (1)),..., ( ( ))k k kM M M Tx x x
   = ( (1)),..., ( ( ))r r rk k kM M M Tx x x
.
.
.
.
#RSAC
Introduction
Traditional SCA flow (Non-profiled)
Guess-and-determine
— Step 3: Compute the expected leakages of the key guess
 Eg. The Hamming Weight model, where M(x)=HW(x)
Eve
Encryption Algorithm
Plaintext
k1
k2
k3
.
.
.
kr
Key Guess List Signal List
.
.
.
.
Actual
Leakage
Most likely key
guess k
 1 1 1
(1),..., ( )k k kx x Tx
 2 2 2
(1),..., ( )k k kx x Tx
 (1),..., ( )r r rk k kx x Tx
 (1),..., ( )l l Tl
Intermediate States
(Assumed)
Leakage
Model
M
Expected
Leakages
   1 1 1
= ( (1)),..., ( ( ))k k kM M M Tx x x
   2 1 1
= ( (1)),..., ( ( ))k k kM M M Tx x x
   = ( (1)),..., ( ( ))r r rk k kM M M Tx x x
.
.
.
.
#RSAC
Introduction
Traditional SCA flow (Non-profiled)
Guess-and-determine
— Step 4: Finding out the most likely key guess
 Eg. In CPA, rank key guesses with Pearson's correlation coefficient
Eve
Encryption Algorithm
Plaintext
k1
k2
k3
.
.
.
kr
Key Guess List Signal List
.
.
.
.
Actual
Leakage
Most likely key
guess k
 1 1 1
(1),..., ( )k k kx x Tx
 2 2 2
(1),..., ( )k k kx x Tx
 (1),..., ( )r r rk k kx x Tx
 (1),..., ( )l l Tl
Intermediate States
(Assumed)
Leakage
Model
M
Expected
Leakages
   1 1 1
= ( (1)),..., ( ( ))k k kM M M Tx x x
   2 1 1
= ( (1)),..., ( ( ))k k kM M M Tx x x
   = ( (1)),..., ( ( ))r r rk k kM M M Tx x x
.
.
.
.
#RSAC
Introduction
Traditional SCA flow (Non-profiled)
Question: did Eve actually recover the intermediate states x?
— Only found the most likely one from a predetermined list
Not a problem for SCA
— Focus on key recovery (Kerckhoffs's principle)
Pros
— The predetermined list (signal list) << whole signal space
— SCA works when SNR<<1
— Efficient key-recovery
#RSAC
Introduction
Traditional SCA flow (Non-profiled)
Cons
— The key guess space should be small
— Known plaintext/ciphertext, known encryption algorithms
Eve
Encryption Algorithm
Plaintext
k1
k2
k3
.
.
.
kr
Signal List
.
.
.
.
Actual
Leakage
Most likely key
guess k
 1 1 1
(1),..., ( )k k kx x Tx
 2 2 2
(1),..., ( )k k kx x Tx
 (1),..., ( )r r rk k kx x Tx
 (1),..., ( )l l Tl
Intermediate States
(Assumed)
Leakage
Model
M
Expected
Leakages
   1 1 1
= ( (1)),..., ( ( ))k k kM M M Tx x x
   2 1 1
= ( (1)),..., ( ( ))k k kM M M Tx x x
   = ( (1)),..., ( ( ))r r rk k kM M M Tx x x
.
.
.
.
#RSAC
Introduction
Traditional SCA flow (Non-profiled)
Limitations: only works for the first/last few rounds
— The related key guess space is too large for SCA
 Eg. In AES, the first/last two rounds are protected
Eve
Encryption Algorithm
Plaintext
k1
k2
k3
.
.
.
kr
Key Guess List Signal List
.
.
.
.
Actual
Leakage
Most likely key
guess k
 1 1 1
(1),..., ( )k k kx x Tx
 2 2 2
(1),..., ( )k k kx x Tx
 (1),..., ( )r r rk k kx x Tx
 (1),..., ( )l l Tl
Intermediate States
(Assumed)
Leakage
Model
M
Expected
Leakages
   1 1 1
= ( (1)),..., ( ( ))k k kM M M Tx x x
   2 1 1
= ( (1)),..., ( ( ))k k kM M M Tx x x
   = ( (1)),..., ( ( ))r r rk k kM M M Tx x x
.
.
.
.
Too large
#RSAC
Introduction
Traditional SCA flow (Non-profiled)
Limitations: Side Channel Analysis for Reverse Engineering
— Cannot compute the intermediate states
Eve
Encryption Algorithm
Plaintext
k1
k2
k3
.
.
.
kr
Key Guess List Signal List
.
.
.
.
Actual
Leakage
Most likely key
guess k
 1 1 1
(1),..., ( )k k kx x Tx
 2 2 2
(1),..., ( )k k kx x Tx
 (1),..., ( )r r rk k kx x Tx
 (1),..., ( )l l Tl
Intermediate States
(Assumed)
Leakage
Model
M
Expected
Leakages
   1 1 1
= ( (1)),..., ( ( ))k k kM M M Tx x x
   2 1 1
= ( (1)),..., ( ( ))k k kM M M Tx x x
   = ( (1)),..., ( ( ))r r rk k kM M M Tx x x
.
.
.
.
Unknown
#RSAC
Introduction
A New Model (Non-profiled)
Directly exploit the leakages, without the pre-determined list
A much harder problem
— Signal List<<Signal Space
— A preliminary attempt in this direction
Eve
Actual
Leakage
Most likely key
guess k
 (1),..., ( )l l Tl
Intermediate States
(Assumed)
Leakage
Model
M
    * * *
1 ,..., Tx x x
#RSAC
Introduction
Notes on profiled attacks
Much stronger pre-conditions
— The Attacker gets an identical encryption device
 Build templates
 Perform template matching
— Works even if T=1 (in theory)
— Reverse the intermediate states without key guesses
Not always appropriate
— Power Variability Issues [Renauld, M., et al EUROCRYPT 2011]
We only focus on non-profiled attacks in this paper
Eve
Actual
Leakage
Most likely key
guess k
 (1),..., ( )l l Tl
Intermediate States
Templates
Tp
    * * *
1 ,..., Tx x x
#RSAC
Outline
Applications in SCA
ICA-based signal recovery
Preliminaries
Introduction
Summary
#RSAC
Preliminaries
Blind Source Separation (BSS)
n people were talking simultaneously
m microphones placed in different positions
all records can be regarded as linear mixtures of the original conversations
source from http://http://slsp.kaist.ac.kr/xe/?mid=BSS
#RSAC
Preliminaries
Blind Source Separation (BSS)
unknown sources:n conversations
unknown mix matrix:the mix features of m microphones
source from http://http://slsp.kaist.ac.kr/xe/?mid=BSS
#RSAC
Preliminaries
Independent Component Analysis (ICA)
Blind sources S=(s1,s2,…,sn)
Linear mix matrix A
m observations Y=(y1,y2,…,ym)
Y=A*S+N (N represents the noise )
source from http://http://slsp.kaist.ac.kr/xe/?mid=BSS
Goal: recover S from Y
#RSAC
Preliminaries
Independent Component Analysis (ICA)
ICA assumptions
— Independence: the sources are independent of each other
— Non-gaussian: the distribution of the blind sources are not gaussian
— n ≤ m
ICA algorithms
— Many popular algorithms
— Not “that” different, use FastICA in this paper
#RSAC
Outline
Applications in SCA
ICA-based signal recovery
Preliminaries
Introduction
Summary
#RSAC
ICA-based signal recovery
ICA versus SCA: Similarities
n bits intermediate state X
Assume the leakage s.t. the weighted Hamming Weight Model
#RSAC
ICA-based signal recovery
ICA versus SCA: Differences
Number of observations: m v.s. 1
Level of Noise: low v.s. high
0 1 1( ) n nL x x x     
#RSAC
ICA-based signal recovery
Constructing multi-channel observations
XOR constant
— If a binary source s is XORed with a constant k, the resultant source s′ is
— XOR 1 equals to flip the signal sign
— Move the sign to the leakage function
— Different leakage functions→ Multi-channel observations
0
'
1 1
k
k

 
 
s
s
s
#RSAC
ICA-based signal recovery
Constructing multi-channel observations
XOR constant
Whitening Transformation
 0,1s
 *
1,1 s
2
0
1




Whitening Transformation
 ' 1 1,0  s s
 *
' 1, 1 s
( 1) 
ICA ambiguity
Leakage Function
L
Leakage Function
L
Real
source
Equivalent
source
#RSAC
ICA-based signal recovery
Noise tolerance
Noise affects the performance of ICA
— ICA usually works in cases where SNR>>1
— For application in SCA, we need more robust algorithm
Ignored feature in ICA
— the distribution of the sources is given: binary signals
— the priori distribution can make ICA more robust to noise
— EM-ICA: specialized for discrete sources with random noise, using Expectation-
Maximization algorithm [Belouchrouni, Cardoso 1994]
#RSAC
ICA-based signal recovery
Specialized ICA for SCA
A specialized ICA based on EM-ICA
#RSAC
Outline
Applications in SCA
ICA-based signal recovery
Preliminaries
Introduction
Summary
#RSAC
Applications in SCA
Experimental Setting
Target Implementation
— Unprotected software implementation of DES
— 8 bit microprocessor (IC card)
Measurement
— LeCroy WaveRunner 610Zi oscilloscope
— Sampling at 20 MSa/s, 80 000 sample points per trace (first 3 rounds)
— 20 000 traces
Extra property
— Perform P bit-by-bit
— Bit-wise leakage Natural multi-channel observations
#RSAC
Applications in SCA
New SCA distinguisher
Attack one of the Sbox in the first round
— Recover the intermediate states from ICA
— Compute the Sbox outputs with key guess
— Find the correct key through
comparing the distance between and
k
X k
rX
k
XrX
L0 R0
IP
E
SP

L1 R1
E
SP

K1
K2
……
rX
k
X
#RSAC
Applications in SCA
New SCA distinguisher
Attack one of the Sbox in the first round
— Key rank: CPA (HW) v.s. ICA
#RSAC
Applications in SCA
Extending SCA to the Middle Rounds
Recovering the 8 Sboxes’ outputs in the second round
— 4-bit outputs, n=4
— The success rate of an ICA recovery
L0 R0
IP
E
SP

L1 R1
E
SP

K1
K2
……
rX
Correct signal
#RSAC
Applications in SCA
Extending SCA to the Middle Rounds
Recovering the 8 Sboxes’ outputs in the second round
— 80% success rate is usually more than enough for round-reduced key-recovery
#RSAC
Applications in SCA
Reverse Engineering on Sbox
A customized DES with secret Sboxes
— Attacker controls the plaintext
— Attacker knows IP and E
— The secret key is embedded in the secret Sbox
— Traditional non-profiled SCA does not work (secret Sbox)
— Attacker can choose several leakage points
'( ) ( )S x S x k 
L0 R0
IP
E
SP

L1 R1
E
SP

K1
K2
……
rX
#RSAC
Applications in SCA
Reverse Engineering on Sbox
A customized DES with secret Sboxes
— Leakage point selection:
 Manually pick
 Linear Discriminant Analysis (LDA)
— Linear Discriminant Analysis
 Do not need precise points, only an approximate range
 Better recovery with larger trace sets
 not suitable when the number of traces is smaller than the range of interest
#RSAC
Applications in SCA
Reverse Engineering on Sbox
A customized DES with secret Sboxes
#RSAC
Applications in SCA
Reverse Engineering on Feistel Round Function
A customized Feistel cipher (both S and P are altered)
— Attacker controls the plaintext
— Attacker knows IP and E
— The first Sbox’s input in the second round
The 6 least significant
bits of E
First round function Initial state after IP
L0 R0
IP
E
SP

L1 R1
E
SP

K1
K2
……
rX
#RSAC
Applications in SCA
Reverse Engineering on Feistel Round Function
A customized Feistel cipher (both S and P are altered)
— Build observations with our XOR constant method
 Choose L0 so that E0(L0)={0x01,0x02,0x04,0x08,0x10,0x20}
 Randomly picked a T-length signal R0
 Measure the leakages for each (E0,R0)
 Repeat 10 times, randomly pick other bits in L0
XOR constant secret signal
L0 R0
IP
E
SP

L1 R1
E
SP

K1
K2
……
rX
#RSAC
Applications in SCA
Reverse Engineering on Feistel Round Function
A customized Feistel cipher (both S and P are altered)
#RSAC
Outline
Applications in SCA
ICA-based signal recovery
Preliminaries
Introduction
Summary
#RSAC
Summary
SCA ≠ guess-and-determine
Directly recover the secret intermediate states without any key guess
— Proposed an ICA-based SCA
 Construct multi-channel observations with XOR constant
 Utilize the priori distribution with EM-ICA
— New possibilities in non-profiled SCA
 Attacking the middle round’s encryption
 Reverse engineering with fewer restrictions
A promising tool in the future?
— Needs more research effort
#RSAC
Thanks for your attention!

More Related Content

What's hot

Pragmatic Optimization in Modern Programming - Mastering Compiler Optimizations
Pragmatic Optimization in Modern Programming - Mastering Compiler OptimizationsPragmatic Optimization in Modern Programming - Mastering Compiler Optimizations
Pragmatic Optimization in Modern Programming - Mastering Compiler OptimizationsMarina Kolpakova
 
Trace-Checking CPS Properties: Bridging the Cyber-Physical Gap
Trace-Checking CPS Properties: Bridging the Cyber-Physical GapTrace-Checking CPS Properties: Bridging the Cyber-Physical Gap
Trace-Checking CPS Properties: Bridging the Cyber-Physical GapLionel Briand
 
PHP Forum Paris 2012: Magic behind the numbers. Software metrics in practice
PHP Forum Paris 2012: Magic behind the numbers. Software metrics in practicePHP Forum Paris 2012: Magic behind the numbers. Software metrics in practice
PHP Forum Paris 2012: Magic behind the numbers. Software metrics in practiceSebastian Marek
 
How to Generate Personalized Tasks and Sample Solutions for Anonymous Peer Re...
How to Generate Personalized Tasks and Sample Solutions for Anonymous Peer Re...How to Generate Personalized Tasks and Sample Solutions for Anonymous Peer Re...
How to Generate Personalized Tasks and Sample Solutions for Anonymous Peer Re...Mathias Magdowski
 
A race of two compilers: GraalVM JIT versus HotSpot JIT C2. Which one offers ...
A race of two compilers: GraalVM JIT versus HotSpot JIT C2. Which one offers ...A race of two compilers: GraalVM JIT versus HotSpot JIT C2. Which one offers ...
A race of two compilers: GraalVM JIT versus HotSpot JIT C2. Which one offers ...J On The Beach
 
VLSI Experiments I
VLSI Experiments IVLSI Experiments I
VLSI Experiments IGouthaman V
 
Sep logic slide
Sep logic slideSep logic slide
Sep logic sliderainoftime
 
(chapter 3) A Concise and Practical Introduction to Programming Algorithms in...
(chapter 3) A Concise and Practical Introduction to Programming Algorithms in...(chapter 3) A Concise and Practical Introduction to Programming Algorithms in...
(chapter 3) A Concise and Practical Introduction to Programming Algorithms in...Frank Nielsen
 
Detecting Occurrences of Refactoring with Heuristic Search
Detecting Occurrences of Refactoring with Heuristic SearchDetecting Occurrences of Refactoring with Heuristic Search
Detecting Occurrences of Refactoring with Heuristic SearchShinpei Hayashi
 
Uncovering Performance Problems in Java Applications with Reference Propagati...
Uncovering Performance Problems in Java Applications with Reference Propagati...Uncovering Performance Problems in Java Applications with Reference Propagati...
Uncovering Performance Problems in Java Applications with Reference Propagati...Dacong (Tony) Yan
 

What's hot (16)

Macro
MacroMacro
Macro
 
Pragmatic Optimization in Modern Programming - Mastering Compiler Optimizations
Pragmatic Optimization in Modern Programming - Mastering Compiler OptimizationsPragmatic Optimization in Modern Programming - Mastering Compiler Optimizations
Pragmatic Optimization in Modern Programming - Mastering Compiler Optimizations
 
Java gets a closure
Java gets a closureJava gets a closure
Java gets a closure
 
Code GPU with CUDA - SIMT
Code GPU with CUDA - SIMTCode GPU with CUDA - SIMT
Code GPU with CUDA - SIMT
 
Session1
Session1Session1
Session1
 
Trace-Checking CPS Properties: Bridging the Cyber-Physical Gap
Trace-Checking CPS Properties: Bridging the Cyber-Physical GapTrace-Checking CPS Properties: Bridging the Cyber-Physical Gap
Trace-Checking CPS Properties: Bridging the Cyber-Physical Gap
 
ECAD lab manual
ECAD lab manualECAD lab manual
ECAD lab manual
 
PHP Forum Paris 2012: Magic behind the numbers. Software metrics in practice
PHP Forum Paris 2012: Magic behind the numbers. Software metrics in practicePHP Forum Paris 2012: Magic behind the numbers. Software metrics in practice
PHP Forum Paris 2012: Magic behind the numbers. Software metrics in practice
 
How to Generate Personalized Tasks and Sample Solutions for Anonymous Peer Re...
How to Generate Personalized Tasks and Sample Solutions for Anonymous Peer Re...How to Generate Personalized Tasks and Sample Solutions for Anonymous Peer Re...
How to Generate Personalized Tasks and Sample Solutions for Anonymous Peer Re...
 
A race of two compilers: GraalVM JIT versus HotSpot JIT C2. Which one offers ...
A race of two compilers: GraalVM JIT versus HotSpot JIT C2. Which one offers ...A race of two compilers: GraalVM JIT versus HotSpot JIT C2. Which one offers ...
A race of two compilers: GraalVM JIT versus HotSpot JIT C2. Which one offers ...
 
VLSI Experiments I
VLSI Experiments IVLSI Experiments I
VLSI Experiments I
 
Sep logic slide
Sep logic slideSep logic slide
Sep logic slide
 
(chapter 3) A Concise and Practical Introduction to Programming Algorithms in...
(chapter 3) A Concise and Practical Introduction to Programming Algorithms in...(chapter 3) A Concise and Practical Introduction to Programming Algorithms in...
(chapter 3) A Concise and Practical Introduction to Programming Algorithms in...
 
Detecting Occurrences of Refactoring with Heuristic Search
Detecting Occurrences of Refactoring with Heuristic SearchDetecting Occurrences of Refactoring with Heuristic Search
Detecting Occurrences of Refactoring with Heuristic Search
 
Uncovering Performance Problems in Java Applications with Reference Propagati...
Uncovering Performance Problems in Java Applications with Reference Propagati...Uncovering Performance Problems in Java Applications with Reference Propagati...
Uncovering Performance Problems in Java Applications with Reference Propagati...
 
Arvindsujeeth scaladays12
Arvindsujeeth scaladays12Arvindsujeeth scaladays12
Arvindsujeeth scaladays12
 

Similar to Ridge-based Profiled Differential Power Analysis

Power estimation in low power vlsi design
Power estimation in low power vlsi designPower estimation in low power vlsi design
Power estimation in low power vlsi designDr.rukmani Devi
 
Scalable Data Science in Python and R on Apache Spark
Scalable Data Science in Python and R on Apache SparkScalable Data Science in Python and R on Apache Spark
Scalable Data Science in Python and R on Apache Sparkfelixcss
 
Fast and Reliable Apache Spark SQL Releases
Fast and Reliable Apache Spark SQL ReleasesFast and Reliable Apache Spark SQL Releases
Fast and Reliable Apache Spark SQL ReleasesDataWorks Summit
 
Robust Low-rank and Sparse Decomposition for Moving Object Detection
Robust Low-rank and Sparse Decomposition for Moving Object DetectionRobust Low-rank and Sparse Decomposition for Moving Object Detection
Robust Low-rank and Sparse Decomposition for Moving Object DetectionActiveEon
 
The Semantics of SPARQL
The Semantics of SPARQLThe Semantics of SPARQL
The Semantics of SPARQLOlaf Hartig
 
Design and minimization of reversible programmable logic arrays and its reali...
Design and minimization of reversible programmable logic arrays and its reali...Design and minimization of reversible programmable logic arrays and its reali...
Design and minimization of reversible programmable logic arrays and its reali...Sajib Mitra
 
Correctness and Performance of Apache Spark SQL
Correctness and Performance of Apache Spark SQLCorrectness and Performance of Apache Spark SQL
Correctness and Performance of Apache Spark SQLNicolas Poggi
 
Correctness and Performance of Apache Spark SQL with Bogdan Ghit and Nicolas ...
Correctness and Performance of Apache Spark SQL with Bogdan Ghit and Nicolas ...Correctness and Performance of Apache Spark SQL with Bogdan Ghit and Nicolas ...
Correctness and Performance of Apache Spark SQL with Bogdan Ghit and Nicolas ...Databricks
 
Cycle’s topological optimizations and the iterative decoding problem on gener...
Cycle’s topological optimizations and the iterative decoding problem on gener...Cycle’s topological optimizations and the iterative decoding problem on gener...
Cycle’s topological optimizations and the iterative decoding problem on gener...Usatyuk Vasiliy
 
Svd filtered temporal usage clustering
Svd filtered temporal usage clusteringSvd filtered temporal usage clustering
Svd filtered temporal usage clusteringLiang Xie, PhD
 
Machine learning using spark
Machine learning using sparkMachine learning using spark
Machine learning using sparkRan Silberman
 
FAULT DETECTION ON OVERHEAD TRANSMISSION LINE USING ARTIFICIAL NEURAL NET...
 FAULT DETECTION ON OVERHEAD TRANSMISSION LINE  USING ARTIFICIAL NEURAL NET... FAULT DETECTION ON OVERHEAD TRANSMISSION LINE  USING ARTIFICIAL NEURAL NET...
FAULT DETECTION ON OVERHEAD TRANSMISSION LINE USING ARTIFICIAL NEURAL NET...Politeknik Negeri Ujung Pandang
 
design-compiler.pdf
design-compiler.pdfdesign-compiler.pdf
design-compiler.pdfFrangoCamila
 
Passive network-redesign-ntua
Passive network-redesign-ntuaPassive network-redesign-ntua
Passive network-redesign-ntuaIEEE NTUA SB
 
QR Factorizations and SVDs for Tall-and-skinny Matrices in MapReduce Architec...
QR Factorizations and SVDs for Tall-and-skinny Matrices in MapReduce Architec...QR Factorizations and SVDs for Tall-and-skinny Matrices in MapReduce Architec...
QR Factorizations and SVDs for Tall-and-skinny Matrices in MapReduce Architec...Austin Benson
 
List intersection for web search: Algorithms, Cost Models, and Optimizations
List intersection for web search: Algorithms, Cost Models, and OptimizationsList intersection for web search: Algorithms, Cost Models, and Optimizations
List intersection for web search: Algorithms, Cost Models, and OptimizationsSunghwan Kim
 
Computational Techniques for the Statistical Analysis of Big Data in R
Computational Techniques for the Statistical Analysis of Big Data in RComputational Techniques for the Statistical Analysis of Big Data in R
Computational Techniques for the Statistical Analysis of Big Data in Rherbps10
 

Similar to Ridge-based Profiled Differential Power Analysis (20)

Power estimation in low power vlsi design
Power estimation in low power vlsi designPower estimation in low power vlsi design
Power estimation in low power vlsi design
 
Scalable Data Science in Python and R on Apache Spark
Scalable Data Science in Python and R on Apache SparkScalable Data Science in Python and R on Apache Spark
Scalable Data Science in Python and R on Apache Spark
 
Fast and Reliable Apache Spark SQL Releases
Fast and Reliable Apache Spark SQL ReleasesFast and Reliable Apache Spark SQL Releases
Fast and Reliable Apache Spark SQL Releases
 
Robust Low-rank and Sparse Decomposition for Moving Object Detection
Robust Low-rank and Sparse Decomposition for Moving Object DetectionRobust Low-rank and Sparse Decomposition for Moving Object Detection
Robust Low-rank and Sparse Decomposition for Moving Object Detection
 
The Semantics of SPARQL
The Semantics of SPARQLThe Semantics of SPARQL
The Semantics of SPARQL
 
Design and minimization of reversible programmable logic arrays and its reali...
Design and minimization of reversible programmable logic arrays and its reali...Design and minimization of reversible programmable logic arrays and its reali...
Design and minimization of reversible programmable logic arrays and its reali...
 
Correctness and Performance of Apache Spark SQL
Correctness and Performance of Apache Spark SQLCorrectness and Performance of Apache Spark SQL
Correctness and Performance of Apache Spark SQL
 
Correctness and Performance of Apache Spark SQL with Bogdan Ghit and Nicolas ...
Correctness and Performance of Apache Spark SQL with Bogdan Ghit and Nicolas ...Correctness and Performance of Apache Spark SQL with Bogdan Ghit and Nicolas ...
Correctness and Performance of Apache Spark SQL with Bogdan Ghit and Nicolas ...
 
Cycle’s topological optimizations and the iterative decoding problem on gener...
Cycle’s topological optimizations and the iterative decoding problem on gener...Cycle’s topological optimizations and the iterative decoding problem on gener...
Cycle’s topological optimizations and the iterative decoding problem on gener...
 
Svd filtered temporal usage clustering
Svd filtered temporal usage clusteringSvd filtered temporal usage clustering
Svd filtered temporal usage clustering
 
Machine learning using spark
Machine learning using sparkMachine learning using spark
Machine learning using spark
 
FAULT DETECTION ON OVERHEAD TRANSMISSION LINE USING ARTIFICIAL NEURAL NET...
 FAULT DETECTION ON OVERHEAD TRANSMISSION LINE  USING ARTIFICIAL NEURAL NET... FAULT DETECTION ON OVERHEAD TRANSMISSION LINE  USING ARTIFICIAL NEURAL NET...
FAULT DETECTION ON OVERHEAD TRANSMISSION LINE USING ARTIFICIAL NEURAL NET...
 
design-compiler.pdf
design-compiler.pdfdesign-compiler.pdf
design-compiler.pdf
 
Scala Macros
Scala MacrosScala Macros
Scala Macros
 
Passive network-redesign-ntua
Passive network-redesign-ntuaPassive network-redesign-ntua
Passive network-redesign-ntua
 
QR Factorizations and SVDs for Tall-and-skinny Matrices in MapReduce Architec...
QR Factorizations and SVDs for Tall-and-skinny Matrices in MapReduce Architec...QR Factorizations and SVDs for Tall-and-skinny Matrices in MapReduce Architec...
QR Factorizations and SVDs for Tall-and-skinny Matrices in MapReduce Architec...
 
List intersection for web search: Algorithms, Cost Models, and Optimizations
List intersection for web search: Algorithms, Cost Models, and OptimizationsList intersection for web search: Algorithms, Cost Models, and Optimizations
List intersection for web search: Algorithms, Cost Models, and Optimizations
 
Gene's law
Gene's lawGene's law
Gene's law
 
Asic
AsicAsic
Asic
 
Computational Techniques for the Statistical Analysis of Big Data in R
Computational Techniques for the Statistical Analysis of Big Data in RComputational Techniques for the Statistical Analysis of Big Data in R
Computational Techniques for the Statistical Analysis of Big Data in R
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 

Ridge-based Profiled Differential Power Analysis

  • 1. SESSION ID:SESSION ID: #RSAC Yu Yu Ridge-based Profiled Differential Power Analysis CRYP-F01 Research Professor Shanghai Jiao Tong University
  • 2. #RSAC Outline 2 Introduction (Profiled) Differential power analysis Profiling phase Exploitation phase Our contributions Ridge-based profiling Theoretical analysis Why and how is ridge-based profiling better? How the coefficients shrink in the ridge-based profiling? Experimental Results Simulation-based experiments Experiments on real FPGA implementation
  • 3. #RSAC Outline 3 Introduction (Profiled) Differential power analysis Profiling phase Exploitation phase Our contributions Ridge-based profiling Theoretical analysis Why and how is ridge-based profiling better? How the coefficients shrink in the ridge-based profiling? Experimental Results Simulation-based experiments Experiments on real FPGA implementation
  • 4. #RSAC (profiled) Difference power analysis 4 Two phases: profiling Exploitation Leakage of : L(·) is leakage function Power model : xz L( )z xT z M() M( ) L( )x xz z M( )z xT z
  • 5. #RSAC Outline 5 Introduction (Profiled) Differential power analysis Profiling phase Exploitation phase Our contributions Ridge-based profiling Theoretical analysis Why and how is ridge-based profiling better? How the coefficients shrink in the ridge-based profiling? Experimental Results Simulation-based experiments Experiments on real FPGA implementation
  • 6. #RSAC Classical profiling 6 The leakage follows Gaussian distribution: For each intermediate variable z: The adversary finds sample mean and the sample covariance . Sample mean is obtained by averaging the power consumptions corresponding to intermediate variable z. To accelerate the profiling: we can assume the sample covariance are identical for all the intermediate variable. z zM( ) (N ), µz z ˆµ z ˆ z ˆ
  • 9. #RSAC Pro and con of LR-based profiling 9
  • 10. #RSAC Outline 10 Introduction (Profiled) Differential power analysis Profiling phase Exploitation phase Our contributions Ridge-based profiling Theoretical analysis Why and how is ridge-based profiling better? How the coefficients shrink in the ridge-based profiling? Experimental Results Simulation-based experiments Experiments on real FPGA implementation
  • 12. #RSAC Outline 12 Introduction (Profiled) Differential power analysis Profiling phase Exploitation phase Our contributions Ridge-based profiling Theoretical analysis Why and how is ridge-based profiling better? How the coefficients shrink in the ridge-based profiling? Experimental Results Simulation-based experiments Experiments on real FPGA implementation
  • 13. #RSAC Our contributions 13 (to mitigate the overfitting issue) New profiling method based on ridge-regression An optimized parameter find method based on cross-validation Theoretical analysis of the new method’s improvement Simulation based and practical experiments
  • 14. #RSAC Outline 14 Introduction (Profiled) Differential power analysis Profiling phase Exploitation phase Our contributions Ridge-based profiling Theoretical analysis Why and how is ridge-based profiling better? How the coefficients shrink in the ridge-based profiling? Experimental Results Simulation-based experiments Experiments on real FPGA implementation
  • 17. #RSAC Optimized parameter is related to the noise level 17 simulation-based experiment trace number = 2000
  • 18. #RSAC Outline 18 Introduction (Profiled) Differential power analysis Profiling phase Exploitation phase Our contributions Ridge-based profiling Theoretical analysis Why and how is ridge-based profiling better? How the coefficients shrink in the ridge-based profiling? Experimental Results Simulation-based experiments Experiments on real FPGA implementation
  • 19. #RSAC Variance of the coefficients 19
  • 20. #RSAC Variance of the coefficients 20 Figure: The variances of the coefficients for degrees (of the model) and λ. The left and right figures correspond to the cases for d = 1 and d = 2 respectively.
  • 21. #RSAC Variance of the coefficients 21 Figure: The variances of the coefficients for degrees (of the model) and λ. The left and right figures correspond to the cases for d = 4 and d = 8 respectively.
  • 22. #RSAC Outline 22 Introduction (Profiled) Differential power analysis Profiling phase Exploitation phase Our contributions Ridge-based profiling Theoretical analysis Why and how is ridge-based profiling better? How the coefficients shrink in the ridge-based profiling? Experimental Results Simulation-based experiments Experiments on real FPGA implementation
  • 23. #RSAC How the coefficients shrink in the ridge-based profiling? 23
  • 24. #RSAC Outline 24 Introduction (Profiled) Differential power analysis Profiling phase Exploitation phase Our contributions Ridge-based profiling Theoretical analysis Why and how is ridge-based profiling better? How the coefficients shrink in the ridge-based profiling? Experimental Results Simulation-based experiments Experiments on real FPGA implementation
  • 25. #RSAC Setup 25 Profiling methods: ridge-based profiling LR-based profiling classical profiling Target intermediate variable: output of AES-128’s first S-box of the first round. Univariate leakage. Different degrees and randomized coefficients. Metrics: perceived Information, guessing entropy.
  • 26. #RSAC A comparison of different profilings for leakage degree 8 26
  • 27. #RSAC A comparison of different profilings for leakage degree 4 27
  • 28. #RSAC A comparison of different profilings for leakage degree 1 28
  • 29. #RSAC A comparison of different profilings for with ‘conservatively’ degree of model 29 The adversary may have no knowledge about the actual degree of the leakage function. He can use the model whose degree is higher than the one of the leakage function. We simulate the traces with leakage functions of degrees 1 and 2 and then conduct the above experiments assuming a model of degree 4 for profiling.
  • 30. #RSAC Degrees of leakage function and model are 1 and 4 respectively 30
  • 31. #RSAC Degrees of leakage function and model are 2 and 4 respectively 31
  • 32. #RSAC Outline 32 Introduction (Profiled) Differential power analysis Profiling phase Exploitation phase Our contributions Ridge-based profiling Theoretical analysis Why and how is ridge-based profiling better? How the coefficients shrink in the ridge-based profiling? Experimental Results Simulation-based experiments Experiments on real FPGA implementation
  • 36. #RSAC Summary 36 Ridge-based profiling can save significant factors in the number of traces they need to build a satisfying leakage model: Better performance for nonlinear leakage functions. Time complexity: equal to the one of LR-based profiling. Robust profiling.
  • 38. SESSION ID:SESSION ID: #RSAC Si Gao My Traces Learn What You Did in the Dark: Recovering Secret Signals without Key Guesses CRYP-F01 PhD Student Trusted Computing and Information Assurance Laboratory Institute of Software, Chinese Academy of Sciences
  • 39. #RSAC Outline Applications in SCA ICA-based signal recovery Preliminaries Introduction Summary
  • 40. #RSAC Outline Applications in SCA ICA-based signal recovery Preliminaries Introduction Summary
  • 41. #RSAC Introduction Side Channel Analysis (SCA) Exploit the computation leakages — Leakages depend on the intermediate state
  • 42. #RSAC Introduction Traditional SCA flow (Non-profiled) Guess-and-determine — Step 1: take a key guess Eve Encryption Algorithm Plaintext k1 k2 k3 . . . kr Key Guess List Signal List . . . . Actual Leakage Most likely key guess k  1 1 1 (1),..., ( )k k kx x Tx  2 2 2 (1),..., ( )k k kx x Tx  (1),..., ( )r r rk k kx x Tx  (1),..., ( )l l Tl Intermediate States (Assumed) Leakage Model M Expected Leakages    1 1 1 = ( (1)),..., ( ( ))k k kM M M Tx x x    2 1 1 = ( (1)),..., ( ( ))k k kM M M Tx x x    = ( (1)),..., ( ( ))r r rk k kM M M Tx x x . . . .
  • 43. #RSAC Introduction Traditional SCA flow (Non-profiled) Guess-and-determine — Step 2: Compute the intermediate states from T plaintexts and the key guess  Eg. The output of an AES Sbox, x=S(p⊕kg) Eve Encryption Algorithm Plaintext k1 k2 k3 . . . kr Key Guess List Signal List . . . . Actual Leakage Most likely key guess k  1 1 1 (1),..., ( )k k kx x Tx  2 2 2 (1),..., ( )k k kx x Tx  (1),..., ( )r r rk k kx x Tx  (1),..., ( )l l Tl Intermediate States (Assumed) Leakage Model M Expected Leakages    1 1 1 = ( (1)),..., ( ( ))k k kM M M Tx x x    2 1 1 = ( (1)),..., ( ( ))k k kM M M Tx x x    = ( (1)),..., ( ( ))r r rk k kM M M Tx x x . . . .
  • 44. #RSAC Introduction Traditional SCA flow (Non-profiled) Guess-and-determine — Step 3: Compute the expected leakages of the key guess  Eg. The Hamming Weight model, where M(x)=HW(x) Eve Encryption Algorithm Plaintext k1 k2 k3 . . . kr Key Guess List Signal List . . . . Actual Leakage Most likely key guess k  1 1 1 (1),..., ( )k k kx x Tx  2 2 2 (1),..., ( )k k kx x Tx  (1),..., ( )r r rk k kx x Tx  (1),..., ( )l l Tl Intermediate States (Assumed) Leakage Model M Expected Leakages    1 1 1 = ( (1)),..., ( ( ))k k kM M M Tx x x    2 1 1 = ( (1)),..., ( ( ))k k kM M M Tx x x    = ( (1)),..., ( ( ))r r rk k kM M M Tx x x . . . .
  • 45. #RSAC Introduction Traditional SCA flow (Non-profiled) Guess-and-determine — Step 4: Finding out the most likely key guess  Eg. In CPA, rank key guesses with Pearson's correlation coefficient Eve Encryption Algorithm Plaintext k1 k2 k3 . . . kr Key Guess List Signal List . . . . Actual Leakage Most likely key guess k  1 1 1 (1),..., ( )k k kx x Tx  2 2 2 (1),..., ( )k k kx x Tx  (1),..., ( )r r rk k kx x Tx  (1),..., ( )l l Tl Intermediate States (Assumed) Leakage Model M Expected Leakages    1 1 1 = ( (1)),..., ( ( ))k k kM M M Tx x x    2 1 1 = ( (1)),..., ( ( ))k k kM M M Tx x x    = ( (1)),..., ( ( ))r r rk k kM M M Tx x x . . . .
  • 46. #RSAC Introduction Traditional SCA flow (Non-profiled) Question: did Eve actually recover the intermediate states x? — Only found the most likely one from a predetermined list Not a problem for SCA — Focus on key recovery (Kerckhoffs's principle) Pros — The predetermined list (signal list) << whole signal space — SCA works when SNR<<1 — Efficient key-recovery
  • 47. #RSAC Introduction Traditional SCA flow (Non-profiled) Cons — The key guess space should be small — Known plaintext/ciphertext, known encryption algorithms Eve Encryption Algorithm Plaintext k1 k2 k3 . . . kr Signal List . . . . Actual Leakage Most likely key guess k  1 1 1 (1),..., ( )k k kx x Tx  2 2 2 (1),..., ( )k k kx x Tx  (1),..., ( )r r rk k kx x Tx  (1),..., ( )l l Tl Intermediate States (Assumed) Leakage Model M Expected Leakages    1 1 1 = ( (1)),..., ( ( ))k k kM M M Tx x x    2 1 1 = ( (1)),..., ( ( ))k k kM M M Tx x x    = ( (1)),..., ( ( ))r r rk k kM M M Tx x x . . . .
  • 48. #RSAC Introduction Traditional SCA flow (Non-profiled) Limitations: only works for the first/last few rounds — The related key guess space is too large for SCA  Eg. In AES, the first/last two rounds are protected Eve Encryption Algorithm Plaintext k1 k2 k3 . . . kr Key Guess List Signal List . . . . Actual Leakage Most likely key guess k  1 1 1 (1),..., ( )k k kx x Tx  2 2 2 (1),..., ( )k k kx x Tx  (1),..., ( )r r rk k kx x Tx  (1),..., ( )l l Tl Intermediate States (Assumed) Leakage Model M Expected Leakages    1 1 1 = ( (1)),..., ( ( ))k k kM M M Tx x x    2 1 1 = ( (1)),..., ( ( ))k k kM M M Tx x x    = ( (1)),..., ( ( ))r r rk k kM M M Tx x x . . . . Too large
  • 49. #RSAC Introduction Traditional SCA flow (Non-profiled) Limitations: Side Channel Analysis for Reverse Engineering — Cannot compute the intermediate states Eve Encryption Algorithm Plaintext k1 k2 k3 . . . kr Key Guess List Signal List . . . . Actual Leakage Most likely key guess k  1 1 1 (1),..., ( )k k kx x Tx  2 2 2 (1),..., ( )k k kx x Tx  (1),..., ( )r r rk k kx x Tx  (1),..., ( )l l Tl Intermediate States (Assumed) Leakage Model M Expected Leakages    1 1 1 = ( (1)),..., ( ( ))k k kM M M Tx x x    2 1 1 = ( (1)),..., ( ( ))k k kM M M Tx x x    = ( (1)),..., ( ( ))r r rk k kM M M Tx x x . . . . Unknown
  • 50. #RSAC Introduction A New Model (Non-profiled) Directly exploit the leakages, without the pre-determined list A much harder problem — Signal List<<Signal Space — A preliminary attempt in this direction Eve Actual Leakage Most likely key guess k  (1),..., ( )l l Tl Intermediate States (Assumed) Leakage Model M     * * * 1 ,..., Tx x x
  • 51. #RSAC Introduction Notes on profiled attacks Much stronger pre-conditions — The Attacker gets an identical encryption device  Build templates  Perform template matching — Works even if T=1 (in theory) — Reverse the intermediate states without key guesses Not always appropriate — Power Variability Issues [Renauld, M., et al EUROCRYPT 2011] We only focus on non-profiled attacks in this paper Eve Actual Leakage Most likely key guess k  (1),..., ( )l l Tl Intermediate States Templates Tp     * * * 1 ,..., Tx x x
  • 52. #RSAC Outline Applications in SCA ICA-based signal recovery Preliminaries Introduction Summary
  • 53. #RSAC Preliminaries Blind Source Separation (BSS) n people were talking simultaneously m microphones placed in different positions all records can be regarded as linear mixtures of the original conversations source from http://http://slsp.kaist.ac.kr/xe/?mid=BSS
  • 54. #RSAC Preliminaries Blind Source Separation (BSS) unknown sources:n conversations unknown mix matrix:the mix features of m microphones source from http://http://slsp.kaist.ac.kr/xe/?mid=BSS
  • 55. #RSAC Preliminaries Independent Component Analysis (ICA) Blind sources S=(s1,s2,…,sn) Linear mix matrix A m observations Y=(y1,y2,…,ym) Y=A*S+N (N represents the noise ) source from http://http://slsp.kaist.ac.kr/xe/?mid=BSS Goal: recover S from Y
  • 56. #RSAC Preliminaries Independent Component Analysis (ICA) ICA assumptions — Independence: the sources are independent of each other — Non-gaussian: the distribution of the blind sources are not gaussian — n ≤ m ICA algorithms — Many popular algorithms — Not “that” different, use FastICA in this paper
  • 57. #RSAC Outline Applications in SCA ICA-based signal recovery Preliminaries Introduction Summary
  • 58. #RSAC ICA-based signal recovery ICA versus SCA: Similarities n bits intermediate state X Assume the leakage s.t. the weighted Hamming Weight Model
  • 59. #RSAC ICA-based signal recovery ICA versus SCA: Differences Number of observations: m v.s. 1 Level of Noise: low v.s. high 0 1 1( ) n nL x x x     
  • 60. #RSAC ICA-based signal recovery Constructing multi-channel observations XOR constant — If a binary source s is XORed with a constant k, the resultant source s′ is — XOR 1 equals to flip the signal sign — Move the sign to the leakage function — Different leakage functions→ Multi-channel observations 0 ' 1 1 k k      s s s
  • 61. #RSAC ICA-based signal recovery Constructing multi-channel observations XOR constant Whitening Transformation  0,1s  * 1,1 s 2 0 1     Whitening Transformation  ' 1 1,0  s s  * ' 1, 1 s ( 1)  ICA ambiguity Leakage Function L Leakage Function L Real source Equivalent source
  • 62. #RSAC ICA-based signal recovery Noise tolerance Noise affects the performance of ICA — ICA usually works in cases where SNR>>1 — For application in SCA, we need more robust algorithm Ignored feature in ICA — the distribution of the sources is given: binary signals — the priori distribution can make ICA more robust to noise — EM-ICA: specialized for discrete sources with random noise, using Expectation- Maximization algorithm [Belouchrouni, Cardoso 1994]
  • 63. #RSAC ICA-based signal recovery Specialized ICA for SCA A specialized ICA based on EM-ICA
  • 64. #RSAC Outline Applications in SCA ICA-based signal recovery Preliminaries Introduction Summary
  • 65. #RSAC Applications in SCA Experimental Setting Target Implementation — Unprotected software implementation of DES — 8 bit microprocessor (IC card) Measurement — LeCroy WaveRunner 610Zi oscilloscope — Sampling at 20 MSa/s, 80 000 sample points per trace (first 3 rounds) — 20 000 traces Extra property — Perform P bit-by-bit — Bit-wise leakage Natural multi-channel observations
  • 66. #RSAC Applications in SCA New SCA distinguisher Attack one of the Sbox in the first round — Recover the intermediate states from ICA — Compute the Sbox outputs with key guess — Find the correct key through comparing the distance between and k X k rX k XrX L0 R0 IP E SP  L1 R1 E SP  K1 K2 …… rX k X
  • 67. #RSAC Applications in SCA New SCA distinguisher Attack one of the Sbox in the first round — Key rank: CPA (HW) v.s. ICA
  • 68. #RSAC Applications in SCA Extending SCA to the Middle Rounds Recovering the 8 Sboxes’ outputs in the second round — 4-bit outputs, n=4 — The success rate of an ICA recovery L0 R0 IP E SP  L1 R1 E SP  K1 K2 …… rX Correct signal
  • 69. #RSAC Applications in SCA Extending SCA to the Middle Rounds Recovering the 8 Sboxes’ outputs in the second round — 80% success rate is usually more than enough for round-reduced key-recovery
  • 70. #RSAC Applications in SCA Reverse Engineering on Sbox A customized DES with secret Sboxes — Attacker controls the plaintext — Attacker knows IP and E — The secret key is embedded in the secret Sbox — Traditional non-profiled SCA does not work (secret Sbox) — Attacker can choose several leakage points '( ) ( )S x S x k  L0 R0 IP E SP  L1 R1 E SP  K1 K2 …… rX
  • 71. #RSAC Applications in SCA Reverse Engineering on Sbox A customized DES with secret Sboxes — Leakage point selection:  Manually pick  Linear Discriminant Analysis (LDA) — Linear Discriminant Analysis  Do not need precise points, only an approximate range  Better recovery with larger trace sets  not suitable when the number of traces is smaller than the range of interest
  • 72. #RSAC Applications in SCA Reverse Engineering on Sbox A customized DES with secret Sboxes
  • 73. #RSAC Applications in SCA Reverse Engineering on Feistel Round Function A customized Feistel cipher (both S and P are altered) — Attacker controls the plaintext — Attacker knows IP and E — The first Sbox’s input in the second round The 6 least significant bits of E First round function Initial state after IP L0 R0 IP E SP  L1 R1 E SP  K1 K2 …… rX
  • 74. #RSAC Applications in SCA Reverse Engineering on Feistel Round Function A customized Feistel cipher (both S and P are altered) — Build observations with our XOR constant method  Choose L0 so that E0(L0)={0x01,0x02,0x04,0x08,0x10,0x20}  Randomly picked a T-length signal R0  Measure the leakages for each (E0,R0)  Repeat 10 times, randomly pick other bits in L0 XOR constant secret signal L0 R0 IP E SP  L1 R1 E SP  K1 K2 …… rX
  • 75. #RSAC Applications in SCA Reverse Engineering on Feistel Round Function A customized Feistel cipher (both S and P are altered)
  • 76. #RSAC Outline Applications in SCA ICA-based signal recovery Preliminaries Introduction Summary
  • 77. #RSAC Summary SCA ≠ guess-and-determine Directly recover the secret intermediate states without any key guess — Proposed an ICA-based SCA  Construct multi-channel observations with XOR constant  Utilize the priori distribution with EM-ICA — New possibilities in non-profiled SCA  Attacking the middle round’s encryption  Reverse engineering with fewer restrictions A promising tool in the future? — Needs more research effort
  • 78. #RSAC Thanks for your attention!