A state-of-the-art software countermeasure to defend against side channel attacks is investigated in this work. The implementation of this novel approach consists of using multithreads and a task scheduler on a microcontroller to purposefully leak out information at critical points in the cryptographic algorithm and confuse the attacker. This research demonstrates it is capable of outperforming the known countermeasure of hiding and shuffling in terms of preventing the secret information from being leaked out. Furthermore, the proposed countermeasure mitigates the side channel attacks, such as correlation power analysis and template attacks.
Reference:
Frieslaar, I. and Irwin, B. 2016. Investigating multi-thread utilization as a software defence mechanism against side channel attacks. Proceedings of the 8th International Conference on Signal Processing Systems, 21-24 November 2016, AUT University, Auckland, New Zealand, p. 188-192. doi: 10.1145/3015166.3015176
Frieslaar, I., & Irwin, B. (2016). Investigating multi-thread utilization as a software defence mechanism against side channel attacks. ACM Digital Library. http://hdl.handle.net/10204/9322
Frieslaar, Ibraheem, and B Irwin. "Investigating multi-thread utilization as a software defence mechanism against side channel attacks." (2016): http://hdl.handle.net/10204/9322
Frieslaar I, Irwin B, Investigating multi-thread utilization as a software defence mechanism against side channel attacks; ACM Digital Library; 2016. http://hdl.handle.net/10204/9322 .