Abstract
Side-channel attacks are persistent vulnerabilities that exploit physical information surrounding a computer system, such as electromagnetic radiation, power consumption, and response time, to leak confidential information from within the system. The observed physical information is input into statistical analysis programs, or characteristics are discovered from processing steps within the computer system, allowing for the extraction of confidential information We propose a mechanism within the operating system to disrupt the power consumption waveforms, preventing the statistical analysis programs of power analysis attacks from functioning effectively. By implementing an API in the operating system to trigger empty interrupt processing solely for transforming the power consumption waveforms used in program sections handling confidential data, we aim to enhance tamper-resistance. In our evaluation, we demonstrated that the empty interrupt processing can effectively prevent the leakage of a 128-bit AES secret key, even with the analysis of one million power consumption waveforms, nearly entirely.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_25
Glamocanin, O., Coulon, L., Regazzoni, F., Stojilovic, M.: Are cloud FPGAs really vulnerable to power analysis attacks? In: Proceedings of of 2020 Design, Automation and Test in Europe Conference and Exhibition (DATE 2020), pp. 1007–1010 (2020)
Ramesh, C., et al.: FPGA side channel attacks without physical access. In: Proceedings of of IEEE 26th Annual International Symposium on Field-Programmable Custom Computing Machines, pp.45–52 (2018)
Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28632-5_2
Tiri, K., Verbauwhede, I.: A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation. In: Proceedings of Design, Automation and Test in Europe Conference and Exhibition (DATE2004), pp. 246–251 (2004)
Tiri, K., et al.: Prototype IC with WDDL and differential routing – DPA resistance assessment. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 354–365. Springer, Heidelberg (2005). https://doi.org/10.1007/11545262_26
Popp, T., Mangard, S.: Masked dual-rail pre-charge logic: DPA-resistance without routing constraints. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 172–186. Springer, Heidelberg (2005). https://doi.org/10.1007/11545262_13
Trichina, E.: Combinational Logic Design for AES SubByte Transformation on Masked Data. Cryptology ePrint Archive, 2003/236 (2003)
Nikova, S., Rechberger, C., Rijmen, V.: Threshold implementations against side-channel attacks and glitches. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 529–545. Springer, Heidelberg (2006). https://doi.org/10.1007/11935308_38
Koyanagi, Y., Ukezono, T.: A cost-sensitive and simple masking design for side-channels. In: Proceedings of 2023 IEEE Region 10 Technical Conference (TENCON 2023), pp. 731–736 (2023)
Herbst, C., Oswald, E., Mangard, S.: An AES smart card implementation resistant to power analysis attacks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 239–252. Springer, Heidelberg (2006). https://doi.org/10.1007/11767480_16
Itoh, K., Takenaka, M., Torii, N.: DPA countermeasure based on the “masking method’’. In: Kim, K. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 440–456. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45861-1_33
Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398–412. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_26
Clavier, C., Coron, J.-S., Dabbous, N.: Differential power analysis in the presence of hardware countermeasures. In: Koç, Ç.K., Paar, C. (eds.) CHES 2000. LNCS, vol. 1965, pp. 252–263. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-44499-8_20
Das, D., et al.: X-deepsca: cross-device deep learning side channel attack. In: Proceedings of 56th Annual Design Automation Conference (DAC 2019) (2019)
Wang, H., Brisfors, M., Forsmark, S., Dubrova, E.: How diversity affects deep-learning side-channel attacks. In: Proceedings of 2019 IEEE Nordic Circuits and Systems Conference (NORCAS 2019) (2019)
ATMEL Corporation, “8/16-bit AVR XMEGA D4 Microcontroller.” https://pdf1.alldatasheet.jp/datasheet-pdf/download/391513/ATMEL/ATXMEGA128D4.html. Accessed 25 July 2024
Lee, J.H., Han, D.-G.: Security analysis on dummy based side-channel countermeasures -Case study: AES with dummy and shuffling. J. Appl. Soft Comput. 93, 1–9 (2020)
O’Flynn, C., Chen, Z.D.: ChipWhisperer: an open-source platform for hardware embedded security research. In: Prouff, E. (ed.) COSADE 2014. LNCS, vol. 8622, pp. 243–260. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10175-0_17
Acknowledgments
This work was supported by JSPS KAKENHI Grant Number 24K14958, and by funding from Fukuoka University (Grant No. GR2410).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Kato, S., Koyanagi, Y., Ukezono, T. (2025). An OS Support for Tamper-Resistant Software Execution Using Empty Interruptions. In: Patil, V.T., Krishnan, R., Shyamasundar, R.K. (eds) Information Systems Security. ICISS 2024. Lecture Notes in Computer Science, vol 15416. Springer, Cham. https://doi.org/10.1007/978-3-031-80020-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-80020-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-80019-1
Online ISBN: 978-3-031-80020-7
eBook Packages: Computer ScienceComputer Science (R0)