ORSHIN Attack Defense Framework

Sensitive data extraction

Description

Sensitive data extraction

CWE

CVE

Attack Surfaces

Cryptographic Algorithm Implementation (MITRE EMB3D PID-11)

Attack Vectors

Side-Channel Leakage (MITRE EMB3D TID-330)

Electromagnetic Side-Channel (MITRE EMB3D TID-102)

Power Analysis (MITRE EMB3D TID-101)

Defenses

Noise introduction, Dummy instruction insertion, Random instruction hints

Power balancing, Power consumption estimation

Constant-time implementation, Data independent timing

Reduction of profiling infrastructure, Reduced performance counter in non-machine mode