ORSHIN Attack Defense Framework

Collection of timing information

Description

Collection of timing information

CWE

CVE

Attack Surfaces

Bootloader (MITRE EMB3D PID-21)

Attack Vectors

Electromagnetic Side-Channel (MITRE EMB3D TID-102)

Profiling

Power Analysis (MITRE EMB3D TID-101)

Code Execution (MITRE EMB3D TID-301)

Hardware Performance Counter

Timing Attack (MITRE EMB3D TID-330)

Defenses

Noise introduction, Dummy instruction insertion, Random instruction hints

Power balancing, Power consumption estimation

Reduction of profiling infrastructure, Reduced performance counter in non-machine mode

Constant-time implementation, Data independent timing