2011
DOI: 10.1007/s13389-011-0011-1
|View full text |Cite
|
Sign up to set email alerts
|

A fair evaluation framework for comparing side-channel distinguishers

Abstract: Abstract. The ability to make meaningful comparisons between side-channel distinguishers is important both to attackers seeking an optimal strategy and to designers wishing to secure a device against the strongest possible threat. The usual experimental approach requires the distinguishing vectors to be estimated: outcomes do not fully represent the inherent theoretic capabilities of distinguishers and do not provide a basis for conclusive, like-for-like comparisons. This is particularly problematic in the cas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
45
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 46 publications
(49 citation statements)
references
References 33 publications
4
45
0
Order By: Relevance
“…Unfortunately, this dependence on prior knowledge has been under-appreciated because of the apparent success of`arbitrary' work-arounds such as the practice of partitioning intermediate variables according to their 7 least signicant bits (sometimes called the 7LSB model). However, it is shown in [34] that this strategy is far from universally-applicable and only works to the extent that the seemingly indierent partition captures something meaningful about the leakage after all. For example, noise on top of a typical CMOS Hamming weight consumption distorts the trace measurements towards the 7LSB model suciently for MIA to succeed, but this is not the case in general (i.e in arbitrary leakage scenarios).…”
Section: Linear Regression (Lr)-based Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Unfortunately, this dependence on prior knowledge has been under-appreciated because of the apparent success of`arbitrary' work-arounds such as the practice of partitioning intermediate variables according to their 7 least signicant bits (sometimes called the 7LSB model). However, it is shown in [34] that this strategy is far from universally-applicable and only works to the extent that the seemingly indierent partition captures something meaningful about the leakage after all. For example, noise on top of a typical CMOS Hamming weight consumption distorts the trace measurements towards the 7LSB model suciently for MIA to succeed, but this is not the case in general (i.e in arbitrary leakage scenarios).…”
Section: Linear Regression (Lr)-based Methodsmentioning
confidence: 99%
“…For the purposes of evaluating the theoretic capabilities of generic emulating and related strategies, we will focus on rst-order asymptotic success, as captured by the (ideal) nearest-rival distinguishing margin (see [33,34]):…”
Section: Measuring Dpa Outcomesmentioning
confidence: 99%
“…Following the example of [15] we wish to carry out our evaluations as far as possible from a theoretic perspective, computing underlying theoretic quantities from fully-specified leakage distributions so that our evaluations are not contingent on the quality of our chosen estimation procedures. This also removes the element of 'guesswork' which inevitably accompanies attempts to evaluate experimental results, where the true underlying distributions arise from a real device and are therefore unknown.…”
Section: Models For Inputs Vs Models For Intermediate Valuesmentioning
confidence: 99%
“…In an attempt to make unambiguous, like-for-like comparisons, which are not dependent on the estimation procedures used nor on the unknown underlying distributions arising in experimental scenarios, we follow the theoretic approach advocated in [15] in the context of non-profiled DPA. Namely, our analytic approach is (as far as possible) based on computed theoretic outcomes rather than estimated experimental outcomes, which entails focusing on fully-specified hypothetical leakage scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…[8,9,11,12,31]). In order to to compare and classify them, theoretical frameworks have then been introduced [11,22,35,39]. Their main purpose is to identify the attacks similarities and differences, and to exhibit contexts where one is better than another.…”
Section: Introductionmentioning
confidence: 99%