Table Of ContentJosep Balasch
Colin O’Flynn (Eds.)
Constructive
1
1
2 Side-Channel Analysis
3
1
S
C and Secure Design
N
L
13th International Workshop, COSADE 2022
Leuven, Belgium, April 11–12, 2022
Proceedings
Lecture Notes in Computer Science 13211
FoundingEditors
GerhardGoos
KarlsruheInstituteofTechnology,Karlsruhe,Germany
JurisHartmanis
CornellUniversity,Ithaca,NY,USA
EditorialBoardMembers
ElisaBertino
PurdueUniversity,WestLafayette,IN,USA
WenGao
PekingUniversity,Beijing,China
BernhardSteffen
TUDortmundUniversity,Dortmund,Germany
GerhardWoeginger
RWTHAachen,Aachen,Germany
MotiYung
ColumbiaUniversity,NewYork,NY,USA
Moreinformationaboutthisseriesathttps://link.springer.com/bookseries/558
·
Josep Balasch Colin O’Flynn (Eds.)
Constructive
Side-Channel Analysis
and Secure Design
13th International Workshop, COSADE 2022
Leuven, Belgium, April 11–12, 2022
Proceedings
Editors
JosepBalasch ColinO’Flynn
KULeuven DalhousieUniversity
Leuven,Belgium Halifax,NS,Canada
ISSN 0302-9743 ISSN 1611-3349 (electronic)
LectureNotesinComputerScience
ISBN 978-3-030-99765-6 ISBN 978-3-030-99766-3 (eBook)
https://doi.org/10.1007/978-3-030-99766-3
©TheEditor(s)(ifapplicable)andTheAuthor(s),underexclusivelicense
toSpringerNatureSwitzerlandAG2022
Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow
knownorhereafterdeveloped.
Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication
doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant
protectivelawsandregulationsandthereforefreeforgeneraluse.
Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbookare
believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors
give a warranty, expressed or implied, with respect to the material contained herein or for any errors or
omissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictionalclaimsin
publishedmapsandinstitutionalaffiliations.
ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG
Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland
Preface
The 13th International Workshop on Constructive Side-Channel Analysis and Secure
Design(COSADE2022),washeldinLeuven,Belgium,duringApril11–12,2022.The
COSADEseriesofworkshopsbeganin2010andprovidesawell-establishedinterna-
tional platform for researchers, academics, and industry participants to present their
currentresearchtopicsinimplementationattacks,secureimplementation,implementa-
tionattack-resilientarchitecturesandschemes,securedesignandevaluation,practical
attacks,testplatforms,andopenbenchmarks.
COSADE 2022 was organized by KU Leuven. This year, the workshop received
25 papers from authors in 14 countries. Each paper was reviewed in a double-blind
peer-review process by four Program Committee members. The Program Committee
included 31 members from 15 countries, selected among experts from academia and
industryintheareasofsecuredesign,sidechannelattacksandcountermeasures,fault
injection attacks, efficient implementations, and architectures and protocols. Overall,
theProgramCommitteereturned94reviewswiththehelpof11additionalreviewers.
Duringthedecisionprocess,12paperswereselectedforpublication.Thesemanuscripts
are contained in these proceedings and the corresponding presentations were part of
the COSADE 2022 program. We would like to express our gratitude to the Program
Committee members for their timely reviews, their active participation in the paper
discussionphase,andtheirwillingnesstocontributetotheshepherdingofconditionally
acceptedpapers.
Inadditiontothe12presentations ofselectedpapers,theprogramwascompleted
bytwokeynotesandanindustrialsession.Thefirstkeynoteentitled“Abstractionsand
ToolingforLeakageEvaluation”wasgivenbyDanPagefromtheUniversityofBristol.
ThetalkgaveanoverviewofsupportforcryptographyontheRISC-VISA,aswellas
currentresearchdirectionsrelatedtotoolingforhigh-levelleakageevaluationtasks.The
secondkeynoteentitled“RepurposingWirelessStacksforIn-DepthSecurityAnalysis”
wasgivenbyJiskaClassenfromtheSecureMobileNetworkingLabatTUDarmstadt.
The talk presented recent research related to the exploration of closed-source wire-
less ecosystems, and demonstrated practical tools and discovered vulnerabilities. The
industrial session included three talks from industry players in the field of hardware
security.
Wewouldliketothankthegeneralchair,BenediktGierlichs,andthelocalorganizers
ofKULeuvenfortheorganization,whichmadethisworkshopamemorableevent.We
areverygratefulforthefinancialsupportreceivedfromourgeneroussponsorsRiscure,
Secure-IC,NewAETechnology,PQShield,Rambus,Texplained,andNXP.Wewould
also like to thank the authors who submitted their work to COSADE 2022, without
whomtheworkshopwouldnothavebeenpossible.
April2022 JosepBalasch
ColinO’Flynn
Organization
SteeringCommittee
Jean-LucDanger TélécomParisTech,France
WernerSchindler BundesamtfürSicherheitinder
Informationstechnik(BSI),Germany
GeneralChair
BenediktGierlichs KULeuven,Belgium
ProgramCommitteeChairs
ColinO’Flynn NewAETechnologyInc.,Canada
JosepBalasch KULeuven,Belgium
ProgramCommittee
DiegoF.Aranha AarhusUniversity,Denmark
VictorArribas RambusCryptographyResearch,TheNetherlands
AlessandroBarenghi PolitecnicodiMilano,Italy
ShivamBhasin NanyangTechnologicalUniversity,Singapore
JakubBreier SiliconAustriaLabs,Austria
OlivierBronchain UniversitéCatholiquedeLouvain,Belgium
ChitchanokChuengsatiansup UniversityofAdelaide,Australia
FabrizioDeSantis SiemensAG,Germany
Jean-MaxDutertre EcoleNationaleSuperieuredesMinesde
Saint-Étienne(ENSMSE),France
WielandFischer InfineonTechnologies,Germany
FatemehGanji WorcesterPolytechnicInstitute,USA
AnnelieHeuser CNRS/IRISA,France
JohannHeyszl FraunhoferAISEC,Germany
NaofumiHomma TohokuUniversity,Japan
Jens-PeterKaps GeorgeMasonUniversity,USA
JulianeKrämer UniversityofRegensburg,Germany
VictorLomne NinjaLab,France
PatrickLonga MicrosoftResearch,USA
RoelMaes IntrinsicID,TheNetherlands
MarcelMedwed NXPSemiconductors,Austria
viii Organization
ThorbenMoos UniversitéCatholiquedeLouvain,Belgium
DanielPage UniversityofBristol,UK
MichaelPehl TechnicalUniversityofMunich,Germany
StjepanPicek DelftUniversityofTechnology,TheNetherlands
ChesterRebeiro IndianInstituteofTechnologyMadras,India
FrancescoRegazzoni UniversityofAmsterdam,TheNetherlands,and
UniversitàdellaSvizzeraitaliana,Switzerland
SujoySinhaRoy TUGraz,Austria
MarcStöttinger RheinMainUniversityofAppliedSciences,
Germany
RuggeroSusella STMicroelectronics,Italy
LennertWouters KULeuven,Belgium
FanZhang ZhejiangUniversity,China
AdditionalReviewers
ReetwikDas MartinRehberg
LukasGiner ThomasSchamberger
MustafaKhairallah
NikhileshSingh
SoundesMarzougui
TimMusic EmanueleStrieder
AntoonPurnal LarsTebelmann
Contents
Machine/DeepLearning
Machine-Learning Assisted Side-Channel Attacks on RNS ECC
ImplementationsUsingHybridFeatureEngineering ........................ 3
NailaMukhtar,LouizaPapachristodoulou,ApostolosP.Fournaris,
LejlaBatina,andYinanKong
FocusisKeytoSuccess:AFocalLossFunctionforDeepLearning-Based
Side-ChannelAnalysis ................................................. 29
MaikelKerkhof,LichaoWu,GuilhermePerin,andStjepanPicek
OntheEvaluationofDeepLearning-BasedSide-ChannelAnalysis ........... 49
LichaoWu,GuilhermePerin,andStjepanPicek
ToolsandReferences
ASecondLookattheASCADDatabases ................................. 75
MaximilianEgger, ThomasSchamberger, LarsTebelmann,
FlorianLippert,andGeorgSigl
FIPAC:ThwartingFault-andSoftware-InducedControl-FlowAttacks
withARMPointerAuthentication ....................................... 100
RobertSchilling,PascalNasahl,andStefanMangard
BodyBiasingInjection:ToThinorNottoThintheSubstrate? ............... 125
G.Chancel,J.-M.Galliere,andP.Maurine
Attacks
On the Susceptibility of Texas Instruments SimpleLink Platform
MicrocontrollerstoNon-invasivePhysicalAttacks ......................... 143
LennertWouters,BenediktGierlichs,andBartPreneel
Single-TraceClusteringPowerAnalysisofthePoint-SwappingProcedure
intheThreePointLadderofCortex-M4SIKE ............................. 164
-
AymericGenêtandNovakKaluderovic´
CanonicalDPAAttackonHMAC-SHA1/SHA2 ........................... 193
FrankSchuhmacher
x Contents
Masking
ProvableSecureSoftwareMaskingintheReal-World ...................... 215
ArthurBeckers,LennertWouters,BenediktGierlichs,BartPreneel,
andIngridVerbauwhede
SystematicStudyofDecryptionandRe-encryptionLeakage:TheCase
ofKyber ............................................................. 236
MelissaAzouaoui, OlivierBronchain, ClémentHoffmann,
YuliaKuzovkova,TobiasSchneider,andFrançois-XavierStandaert
Handcrafting:ImprovingAutomatedMaskinginHardwarewithManual
Optimizations ......................................................... 257
CharlesMomin,GaëtanCassiers,andFrançois-XavierStandaert
AuthorIndex ......................................................... 277