Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/144640
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRoy, Debapriya Basuen_US
dc.contributor.authorBhasin, Shivamen_US
dc.contributor.authorGuilley, Sylvainen_US
dc.contributor.authorHeuser, Annelieen_US
dc.contributor.authorPatranabis, Sikharen_US
dc.contributor.authorMukhopadhyay, Debdeepen_US
dc.date.accessioned2020-11-16T09:18:56Z-
dc.date.available2020-11-16T09:18:56Z-
dc.date.issued2018-
dc.identifier.citationRoy, D. B., Bhasin, S., Guilley, S., Heuser, A., Patranabis, S., & Mukhopadhyay, D. (2019). CC meets FIPS : a hybrid test methodology for first order side channel analysis. IEEE Transactions on Computers, 68(3), 347-361. doi:10.1109/tc.2018.2875746en_US
dc.identifier.issn0018-9340en_US
dc.identifier.urihttps://hdl.handle.net/10356/144640-
dc.description.abstractCommon Criteria (CC) and FIPS 140-3 are two popular side channel testing methodologies. Test Vector Leakage Assessment Methodology (TVLA), a potential candidate for FIPS, can detect the presence of side-channel information in leakage measurements. However, TVLA results cannot be used to quantify side-channel vulnerability and it is an open problem to derive its relationship with side channel attack success rate (SR), i.e., a common metric for CC. In this paper, we extend the TVLA testing beyond its current scope. Precisely, we derive a concrete relationship between TVLA and signal to noise ratio (SNR). The linking of the two metrics allows direct computation of success rate (SR) from TVLA for given choice of intermediate variable and leakage model and thus unify these popular side channel detection and evaluation metrics. An end-to-end methodology is proposed, which can be easily automated, to derive attack SR starting from TVLA testing. The methodology works under both univariate and multivariate setting and is capable of quantifying any first order leakage. Detailed experiments have been provided using both simulated traces and real traces on SAKURA-GW platform. Additionally, the proposed methodology is benchmarked against previously published attacks on DPA contest v4.0 traces, followed by extension to jitter based countermeasure. The result shows that the proposed methodology provides a quick estimate of SR without performing actual attacks, thus bridging the gap between CC and FIPS.en_US
dc.language.isoenen_US
dc.relation.ispartofIEEE Transactions on Computersen_US
dc.rights© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/TC.2018.2875746.en_US
dc.subjectEngineering::Civil engineeringen_US
dc.titleCC meets FIPS : a hybrid test methodology for first order side channel analysisen_US
dc.typeJournal Articleen
dc.identifier.doi10.1109/TC.2018.2875746-
dc.description.versionAccepted versionen_US
dc.identifier.issue3en_US
dc.identifier.volume68en_US
dc.identifier.spage347en_US
dc.identifier.epage361en_US
dc.subject.keywordsSide Channelen_US
dc.subject.keywordsEvaluation Based Testingen_US
item.fulltextWith Fulltext-
item.grantfulltextopen-
Appears in Collections:TL Journal Articles
Files in This Item:
File Description SizeFormat 
CC meets FIPS a hybrid test methodology for first order side channel analysis.pdf1.28 MBAdobe PDFThumbnail
View/Open

PublonsTM
Citations 20

3
Updated on Mar 5, 2021

Page view(s)

75
Updated on Oct 28, 2021

Download(s)

12
Updated on Oct 28, 2021

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.