A Novel Framework for Explainable Leakage Assessment

Research output: Working paper/PreprintPreprint

Abstract

Non-specific leakage detection (initially introduced as “Test Vector Leakage Assessment”, short TVLA) plays a vital role in practice because it detects (potential) leaks independently of assumptions about the leakage model and any specific attack vector. However, the nonspecific nature means detected leaks might not be exploitable, and thus the current state of the art is to employ a battery of specific attacks to confirm the detection outcomes.

We propose a novel leakage assessment framework which enables to link non-specific leakage detection outcomes with size of the key guess that is necessary to exploit them. We therefore solve the problem of deciding if or not a leak is exploitable without the need for specific attacks. Our methodology furthermore enables (for a detected leak) to reveal the specific key bytes, and with that, it allows the construction of confirmatory attacks. This novel approach is enabled by proposing to cast the leakage detection problem as the statistical task of building key-dependent regression models: if such a model exists, then we know that the point leaks. Depending on the size and nature of the model, we can further judge the exploitability and provide a concrete attack vector.
Original languageEnglish
PublisherCryptology ePrint Archive
Publication statusPublished - 20 Feb 2022

Keywords

  • Leakage detection
  • Side channel analysis

Fingerprint

Dive into the research topics of 'A Novel Framework for Explainable Leakage Assessment'. Together they form a unique fingerprint.

Cite this