An OS Support for Tamper-Resistant Software Execution Using Empty Interruptions | SpringerLink
Skip to main content

An OS Support for Tamper-Resistant Software Execution Using Empty Interruptions

  • Conference paper
  • First Online:
Information Systems Security (ICISS 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 15416))

Included in the following conference series:

  • 267 Accesses

Abstract

Side-channel attacks are persistent vulnerabilities that exploit physical information surrounding a computer system, such as electromagnetic radiation, power consumption, and response time, to leak confidential information from within the system. The observed physical information is input into statistical analysis programs, or characteristics are discovered from processing steps within the computer system, allowing for the extraction of confidential information We propose a mechanism within the operating system to disrupt the power consumption waveforms, preventing the statistical analysis programs of power analysis attacks from functioning effectively. By implementing an API in the operating system to trigger empty interrupt processing solely for transforming the power consumption waveforms used in program sections handling confidential data, we aim to enhance tamper-resistance. In our evaluation, we demonstrated that the empty interrupt processing can effectively prevent the leakage of a 128-bit AES secret key, even with the analysis of one million power consumption waveforms, nearly entirely.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 8465
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 10581
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_25

    Chapter  Google Scholar 

  2. Glamocanin, O., Coulon, L., Regazzoni, F., Stojilovic, M.: Are cloud FPGAs really vulnerable to power analysis attacks? In: Proceedings of of 2020 Design, Automation and Test in Europe Conference and Exhibition (DATE 2020), pp. 1007–1010 (2020)

    Google Scholar 

  3. Ramesh, C., et al.: FPGA side channel attacks without physical access. In: Proceedings of of IEEE 26th Annual International Symposium on Field-Programmable Custom Computing Machines, pp.45–52 (2018)

    Google Scholar 

  4. Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28632-5_2

    Chapter  Google Scholar 

  5. Tiri, K., Verbauwhede, I.: A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation. In: Proceedings of Design, Automation and Test in Europe Conference and Exhibition (DATE2004), pp. 246–251 (2004)

    Google Scholar 

  6. Tiri, K., et al.: Prototype IC with WDDL and differential routing – DPA resistance assessment. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 354–365. Springer, Heidelberg (2005). https://doi.org/10.1007/11545262_26

    Chapter  Google Scholar 

  7. Popp, T., Mangard, S.: Masked dual-rail pre-charge logic: DPA-resistance without routing constraints. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 172–186. Springer, Heidelberg (2005). https://doi.org/10.1007/11545262_13

    Chapter  Google Scholar 

  8. Trichina, E.: Combinational Logic Design for AES SubByte Transformation on Masked Data. Cryptology ePrint Archive, 2003/236 (2003)

    Google Scholar 

  9. Nikova, S., Rechberger, C., Rijmen, V.: Threshold implementations against side-channel attacks and glitches. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 529–545. Springer, Heidelberg (2006). https://doi.org/10.1007/11935308_38

    Chapter  Google Scholar 

  10. Koyanagi, Y., Ukezono, T.: A cost-sensitive and simple masking design for side-channels. In: Proceedings of 2023 IEEE Region 10 Technical Conference (TENCON 2023), pp. 731–736 (2023)

    Google Scholar 

  11. Herbst, C., Oswald, E., Mangard, S.: An AES smart card implementation resistant to power analysis attacks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 239–252. Springer, Heidelberg (2006). https://doi.org/10.1007/11767480_16

    Chapter  Google Scholar 

  12. Itoh, K., Takenaka, M., Torii, N.: DPA countermeasure based on the “masking method’’. In: Kim, K. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 440–456. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45861-1_33

    Chapter  Google Scholar 

  13. Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398–412. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_26

    Chapter  Google Scholar 

  14. Clavier, C., Coron, J.-S., Dabbous, N.: Differential power analysis in the presence of hardware countermeasures. In: Koç, Ç.K., Paar, C. (eds.) CHES 2000. LNCS, vol. 1965, pp. 252–263. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-44499-8_20

    Chapter  Google Scholar 

  15. Das, D., et al.: X-deepsca: cross-device deep learning side channel attack. In: Proceedings of 56th Annual Design Automation Conference (DAC 2019) (2019)

    Google Scholar 

  16. Wang, H., Brisfors, M., Forsmark, S., Dubrova, E.: How diversity affects deep-learning side-channel attacks. In: Proceedings of 2019 IEEE Nordic Circuits and Systems Conference (NORCAS 2019) (2019)

    Google Scholar 

  17. ATMEL Corporation, “8/16-bit AVR XMEGA D4 Microcontroller.” https://pdf1.alldatasheet.jp/datasheet-pdf/download/391513/ATMEL/ATXMEGA128D4.html. Accessed 25 July 2024

  18. Lee, J.H., Han, D.-G.: Security analysis on dummy based side-channel countermeasures -Case study: AES with dummy and shuffling. J. Appl. Soft Comput. 93, 1–9 (2020)

    Article  Google Scholar 

  19. O’Flynn, C., Chen, Z.D.: ChipWhisperer: an open-source platform for hardware embedded security research. In: Prouff, E. (ed.) COSADE 2014. LNCS, vol. 8622, pp. 243–260. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10175-0_17

    Chapter  Google Scholar 

Download references

Acknowledgments

This work was supported by JSPS KAKENHI Grant Number 24K14958, and by funding from Fukuoka University (Grant No. GR2410).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tomoaki Ukezono .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kato, S., Koyanagi, Y., Ukezono, T. (2025). An OS Support for Tamper-Resistant Software Execution Using Empty Interruptions. In: Patil, V.T., Krishnan, R., Shyamasundar, R.K. (eds) Information Systems Security. ICISS 2024. Lecture Notes in Computer Science, vol 15416. Springer, Cham. https://doi.org/10.1007/978-3-031-80020-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-80020-7_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-80019-1

  • Online ISBN: 978-3-031-80020-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics