Effective Circuit Probing: A Step‐by‐Step Guide to Placement, Extention, and Removal - ChairImpSec/PROLEAD GitHub Wiki
PROLEAD evaluates the probing security of masked circuits by mimicking an adversary's ability to extract sensitive information through abstract probes.
In this context, a probe represents the potential information an adversary might gather by observing the circuit's execution. Each probe records the stable signal of the wire on which it is placed, capturing this signal during a specific clock cycle.
An adversary, constrained by the order
setting of PROLEAD, can place a limited number of probes on arbitrary wires and during chosen clock cycles.
PROLEAD then performs a statistical test on a simulated set of joint observations gathered from the probes. This analysis determines whether the information captured by the adversary reveals any sensitive data processed within the circuit. Through these evaluations, PROLEAD helps designers identify and mitigate potential security weaknesses in masked circuits.
To enable a comprehensive security analysis, PROLEAD, by default, evaluates all possible probing adversaries capable of placing d probes. An initial example, we show the default adversary generation based on a masked circuit specified by the following netlist. The given animation shows how PROLEAD iterates through all adversaries with the ability to place 2 probes on arbitrary wires. Note that we do not allow to place probes directly on primary inputs as we assume that shared inputs are uniformly distributed.
|
By default, PROLEAD applies a glitch-extension procedure to each probe, simulating the impact of glitches on adversarial observations. Through this process, each probe is replaced by a set of glitch-extended probes on all wires that contribute to the probed signal via combinational logic. Additionally, the transitional_leakage
setting enables the simulation of the leakage caused signal transitions by substituting each probe with two probes that record data over two consecutive clock cycles, thereby capturing the effect of these transitions on adversarial observations. The following animation shows the glitch-extension procedure applied by PROLEAD based on a selected adversary.