Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/144640
Title: CC meets FIPS : a hybrid test methodology for first order side channel analysis
Authors: Roy, Debapriya Basu
Bhasin, Shivam
Guilley, Sylvain
Heuser, Annelie
Patranabis, Sikhar
Mukhopadhyay, Debdeep
Keywords: Engineering::Civil engineering
Issue Date: 2018
Source: Roy, D. B., Bhasin, S., Guilley, S., Heuser, A., Patranabis, S., & Mukhopadhyay, D. (2019). CC meets FIPS : a hybrid test methodology for first order side channel analysis. IEEE Transactions on Computers, 68(3), 347-361. doi:10.1109/tc.2018.2875746
Journal: IEEE Transactions on Computers 
Abstract: Common Criteria (CC) and FIPS 140-3 are two popular side channel testing methodologies. Test Vector Leakage Assessment Methodology (TVLA), a potential candidate for FIPS, can detect the presence of side-channel information in leakage measurements. However, TVLA results cannot be used to quantify side-channel vulnerability and it is an open problem to derive its relationship with side channel attack success rate (SR), i.e., a common metric for CC. In this paper, we extend the TVLA testing beyond its current scope. Precisely, we derive a concrete relationship between TVLA and signal to noise ratio (SNR). The linking of the two metrics allows direct computation of success rate (SR) from TVLA for given choice of intermediate variable and leakage model and thus unify these popular side channel detection and evaluation metrics. An end-to-end methodology is proposed, which can be easily automated, to derive attack SR starting from TVLA testing. The methodology works under both univariate and multivariate setting and is capable of quantifying any first order leakage. Detailed experiments have been provided using both simulated traces and real traces on SAKURA-GW platform. Additionally, the proposed methodology is benchmarked against previously published attacks on DPA contest v4.0 traces, followed by extension to jitter based countermeasure. The result shows that the proposed methodology provides a quick estimate of SR without performing actual attacks, thus bridging the gap between CC and FIPS.
URI: https://hdl.handle.net/10356/144640
ISSN: 0018-9340
DOI: 10.1109/TC.2018.2875746
Rights: © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/TC.2018.2875746.
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:TL Journal Articles

Files in This Item:
File Description SizeFormat 
CC meets FIPS a hybrid test methodology for first order side channel analysis.pdf1.28 MBAdobe PDFThumbnail
View/Open

PublonsTM
Citations 20

3
Updated on Mar 5, 2021

Page view(s)

75
Updated on Oct 28, 2021

Download(s)

12
Updated on Oct 28, 2021

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.