[Resource Topic] 2021/794: Reverse Engineering the Micro-Architectural Leakage Features of a Commercial Processor

Welcome to the resource topic for 2021/794

Title:
Reverse Engineering the Micro-Architectural Leakage Features of a Commercial Processor

Authors: Si Gao, Elisabeth Oswald, Dan Page

Abstract:

Micro-architectural leakage is a reality even on low- to midrange commercial processors. Dealing with it is expensive, because micro-architectural leakage is often only discovered after implementation choices have been made (i.e. when evaluating the concrete implementation). We demonstrate that it is feasible, using a recent leakage modelling technique, to reverse engineer significant elements of the micro-architectural leakage of a mid-range commercial processor in a “grey-box” setting. Our approach first recovers the micro-architectural features of each stage in the pipeline, and the leakage of elements that are known to produce glitches. To put our reverse engineered micro-architectural leakage in context, we compare and contrast a leakage analysis of a relevant piece of masking code. More specifically, we compare the leakage that we would anticipate given our analysis, and predictions of the to-date most sophisticated leakage simulators (e.g. ELMO and MAPS) on the same piece of code. Our research demonstrates that reverse engineering of micro-architectural components (and their leakage) is clearly feasible using available side channel leakage, and following, it should be possible to build more accurate leakage simulators.

ePrint: https://eprint.iacr.org/2021/794

Talk: https://www.youtube.com/watch?v=ypA4WfoNSv8

Slides: https://iacr.org/submit/files/slides/2022/eurocrypt/eurocrypt2022/345/slides.pdf

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .