Award Abstract # 1115839
TC: Small: New Directions in Side Channel Attacks and Countermeasures

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: VIRGINIA POLYTECHNIC INSTITUTE & STATE UNIVERSITY
Initial Amendment Date: July 23, 2011
Latest Amendment Date: May 6, 2013
Award Number: 1115839
Award Instrument: Standard Grant
Program Manager: Deborah Shands
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: August 1, 2011
End Date: July 31, 2015 (Estimated)
Total Intended Award Amount: $429,558.00
Total Awarded Amount to Date: $437,558.00
Funds Obligated to Date: FY 2011 = $429,558.00
FY 2013 = $8,000.00
History of Investigator:
  • Inyoung Kim (Principal Investigator)
    inyoungk@vt.edu
  • Patrick Schaumont (Co-Principal Investigator)
Recipient Sponsored Research Office: Virginia Polytechnic Institute and State University
300 TURNER ST NW
BLACKSBURG
VA  US  24060-3359
(540)231-5281
Sponsor Congressional District: 09
Primary Place of Performance: Virginia Polytechnic Institute and State University
300 TURNER ST NW
BLACKSBURG
VA  US  24060-3359
Primary Place of Performance
Congressional District:
09
Unique Entity Identifier (UEI): QDE5UHE5XD16
Parent UEI: X6KEFGLHSJX7
NSF Program(s): Special Projects - CNS,
TRUSTWORTHY COMPUTING
Primary Program Source: 01001314DB NSF RESEARCH & RELATED ACTIVIT
01001112DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 9102, 9251, 7795, 9178, 7923
Program Element Code(s): 171400, 779500
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

This project develops new and promising techniques in the area of side-channel attacks and their corresponding countermeasures. In a side-channel attack, an attacker captures the implementation effects of cryptography, such as power consumption and execution time. A distinctive feature of a side-channel analysis (SCA) attack is that it can reveal a small part of the secret-key. Hence, side-channel attacks avoid the brute-force complexity of cryptanalysis. Using novel side-channel estimation techniques based on Bayesian statistics, the project develops more powerful side-channel attacks. The development of novel side-channel analysis techniques is crucial in order to obtain the best possible countermeasures. The project also develops novel software-oriented countermeasures that more flexible and general than traditional hardware-oriented side-channel countermeasures. The efficiency of side-channel attacks and side-channel countermeasures are evaluated using hardware and software prototyping. The project combines advanced statistical techniques with advanced computer engineering, building synergy between Statistics and Computer Engineering. In the field of Statistics, the Bayesian matching technique can be used for variable selection, a technique that is applicable to related problems in biostatistics, machine learning, data mining, genomics, and other areas with high dimensional data. Project results will be disseminated by distributing open-source prototype implementations, measurement data, and in open publications. A formal training program within the Laboratory for Interdisciplinary Statistical Analysis (LISA) at Virginia Tech is developed to distribute the results of this project to students.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Y. Xu, I. Kim, and P. Schaumont "Adaptive Bayes Sum Test for the Equality of Two Nonparametric Functions." Journal of Applied Statistics , 2015
H. Eldib, C. Wang, M. Taha, P. Schaumont "Quantitative Masking Strength: Quantifying the Power Side-Channel Resistance of Software Code" IEEE Transactions on Computer Aided Design of Integrated Circuits and Systems , v.PP , 2015 10.1109/TCAD.2015.2424951
H. Eldib, C. Wang, P. Schaumont "Formal Verification of Software Countermeasures against Side-Channel Attacks" ACM Transactions on Software Engineering and Methodology , v.24 , 2014 10.1145/2685616
H. Zhang and I. Kim "Adaptive Rejection Metropolis Simulated Annealing for Detecting Global Maximum Region" Methodology and Computing in Applied Probability , 2014
H. Zhang and I. Kim "emiparametric Bayesian Hierarchical Models for Nonlinear Mixed Effects Model" Journal of Applied Statistics , 2014
J. Chen, I. Kim, G. Terrell, L. Liu, and G. Toth "Generalized single-index mixed model for repeated measures data" Journal of Nonparametric statistics , 2014
M. Taha, P. Schaumont "Key-Updating for Leakage Resiliency with Application to AES Modes of Operation" IEEE Transactions on Information Forensics & Security , v.10 , 2015 , p.519 http://dx.doi.org/10.1109/TIFS.2014.2383359

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

A secure embedded system is a small integrated computer that makes part of an electronically operated system. Secure embedded systems can be found, for example, in electronic door locks, in ATM machines, or in high-safety industrial control networks. Secure embedded systems provide information security and encryption technologies such that sensitive data, such as door lock combinations, can be safely transmitted without the risk of being eavesdropped or hacked.

However, secure embedded systems are subject to tampering by adversaries, and side-channel attacks present a recent yet serious threat to the integrity of the operation of such systems. In a side-channel attack, an adversary resides in proximity of the secure embedded system, and captures its power dissipationor electromagnetic radiation. This side-channel leakage contains informationcorrelated to the internal secret used by the embedded system. The objective of the side-channel attack is to extract this secret.

In this project, a statistician (PI) and a computer engineer (co-PI) colaborated to design novel techniques for side-channel analysis, with the objective of developing better, stronger countermeasures. The project, run over three years, involved 6 students and produced 17 scientific, peer-reviewed publications. The project produced several useful and constructive techniques in the field of side-channel analysis. 

One result included a technique to program a cryptographic algorithm into an embedded system in a manner that it does not produce harmful side-channel leakage. The technique is useful because it can be applied to any existing embedded system, and because it does not require the construction of new, specialized hardware - which would be expensive. Another result is a compiler technique that a software programmer would use to test if a given embedded program is free from side-channel leakage or not. This technique is quite useful because it can be applied by software designers who are non-experts in side-channel analysis.

Finally, this project lead to novel insights into the behavior of side-channel leakage in secure embedded system. One of the ongoing efforts is to investigate the application of side-channel leakage countermeasure techniques into techniques that apply to the construction of better, more secure microprocessors.


Last Modified: 08/27/2015
Modified by: Patrick Schaumont

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page