Skip to content

ChairImpSec/PROLEAD

Folders and files

NameName
Last commit message
Last commit date

Latest commit

5211bf6 · Sep 18, 2024
Dec 20, 2023
Aug 15, 2024
Aug 15, 2024
Aug 30, 2024
Aug 27, 2024
Sep 18, 2024
Sep 18, 2024
Sep 18, 2024
May 30, 2023
Dec 12, 2023
Dec 26, 2023
Jul 14, 2022
Aug 15, 2024
Aug 20, 2024
Aug 13, 2024
Aug 14, 2024
Aug 13, 2024
Aug 13, 2024
Aug 16, 2024
Aug 20, 2024

Repository files navigation

PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software

This repository contains the source code for the papers PROLEAD - A Probing-Based Hardware Leakage Detection Tool and PROLEAD_SW - Probing-Based Software Leakage Detection for ARM Binaries. For a quick start, we recommend to watch the quick start guides on our Youtube Channel or to read the Hardware beginner's guide or Software beginner's guide .

News

We are excited to announce the release of PROLEADv3, an enhanced and extended version of the original PROLEAD tool. This new version includes several significant features:

  • Evaluation of side-channel resistance under the RR d-probing model
  • Assessment of security against combined adversaries capable of injecting faults and probing wires
  • Support for .json files for configuration and library management, replacing the previous custom file format
  • More granular settings to precisely define adversarial capabilities

We acknowledge that only a few examples are currently available and that full documentation is still in progress. We're working to provide both as quickly as possible. In the meantime, if you have any questions about using PROLEAD, please don't hesitate to reach out to us.

Features

PROLEAD allows to analyze the robust probing security of masked implementations provided as a Verilog netlist or ARM binary. In particular, PROLEAD supports the following features:

  • Evaluation of masked hardware designs (Verilog netlists)

    • Consideration of glitches and transitions (simultaneously)
    • Univariate and multivariate adversaries
  • Evaluation of masked software designs (ARM binaries)

    • Consideration of various micro-architectural effects (simultaneously)
      • Neighbor Leakage Effects
      • Bit-wise Interaction Leakages
      • Memory Overwrite Effects
      • Memory Remnant Effecs
      • Pipeline Register Overwrites
      • Pipeline Forwarding Effects
    • CPU-independent leakage detection

Documentation

All information about the features and use of PROLEAD can be found in the Wiki.

Examples

Some selected examples can be found in the examples folder. More information regarding the examples can be found in the Wiki. We will provide more examples soon.

Contact and Support

Please contact Nicolai Müller (nicolai.mueller@rub.de) if you have any questions, comments, if you found a bug that should be corrected, or if you want to reuse PROLEAD or parts of it for your own research projects.

Publications