Abstract

The hardware systems have experienced a plethora of side-channel attacks (SCAs) in recent years with cache-based SCAs being one of the dominant threats. The SCAs exploit the architectural caveats, which invariably leak essential information during an application's execution. Shutting down the side-channels is not a feasible approach due to various restrictions, such as architectural changes and complexity. To overcome such concerns and protect the data integrity, we introduce Entropy-Shield in this work. The proposed Entropy-Shield aims to maximize the entropy in the leaked side-channel information rather than attempting to close the side-channels. To achieve this, the proposed Entropy-Shield introduces carefully and sensibly crafted perturbations into the victim application, thereby increasing the entropy of the information obtained by the attacker to deduce the secret key, while the information being observed looks legit yet futile. This methodology has been successfully tested on cache targeted SCAs such as Flush+Reload and Flush+Flush and the key information retrieved by the attacker is shown to be ultimately futile, indicating the success of proposed Entropy-Shield.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.