Fuzzing+Hardware Performance Counters-Based Detection of Algorithm Subversion Attacks on Post-Quantum Signature Schemes

Animesh Basak Chowdhury, Anushree Mahapatra, Deepraj Soni, Ramesh Karri

Research output: Contribution to journalArticlepeer-review

Abstract

NIST is standardizing Post Quantum Cryptography (PQC) algorithms that are resilient to the computational capability of quantum computers. Past works show malicious subversion with cryptographic software (algorithm subversion attacks) that weaken the implementations. We show that PQC digital signature codes can be subverted in line with previously reported flawed implementations debssl2008,dualec2016 that generate verifiable, but less-secure signatures, demonstrating the risk of such attacks. Since, all processors have built-in Hardware Performance Counters (HPCs), there exists a body of work proposing a low-cost Machine Learning (ML)-based integrity checking of software using HPC fingerprints. However, such HPC-based approaches may not detect subversion of PQC codes. A miniscule percentage of qualitative inputs when applied to the PQC codes improve this accuracy to 98%. We propose grey-box fuzzing as a pre-processing step to obtain inputs to aid the proposed HPC-based method.

Keywords

  • Codes
  • Cryptography
  • Hardware
  • Hardware Performance Counters
  • Integrity Verification
  • Monitoring
  • Post-Quantum Cryptography
  • Program processors
  • Software
  • Software algorithms
  • Tamper Detection.

ASJC Scopus subject areas

  • Software
  • Computer Graphics and Computer-Aided Design
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Fuzzing+Hardware Performance Counters-Based Detection of Algorithm Subversion Attacks on Post-Quantum Signature Schemes'. Together they form a unique fingerprint.

Cite this