Paper 2023/1395
Generic SCARE: reverse engineering without knowing the algorithm nor the machine
Abstract
We introduce a novel side-channel-based reverse engineering technique capable of reconstructing a procedure solely from inputs, outputs, and traces of execution. Beyond generic restrictions, we do not assume any prior knowledge of the procedure or the chip it operates on. These restrictions confine our analysis to 8-bit RISC constant-time software implementations. Specifically, we demonstrate the feasibility of reconstructing a symmetric cryptographic cipher, even in scenarios where traces are sampled with information loss and noise, such as when measuring the power consumption of the chip.
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- Side channelsreverse engineeringSCARERISC
- Contact author(s)
-
ronan lashermes @ inria fr
helene le-bouder @ imt-atlantique fr - History
- 2023-09-21: approved
- 2023-09-18: received
- See all versions
- Short URL
- https://ia.cr/2023/1395
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2023/1395, author = {Ronan Lashermes and Hélène Le Bouder}, title = {Generic {SCARE}: reverse engineering without knowing the algorithm nor the machine}, howpublished = {Cryptology {ePrint} Archive, Paper 2023/1395}, year = {2023}, url = {https://eprint.iacr.org/2023/1395} }