2022
DOI: 10.1109/tcad.2022.3197507
|View full text |Cite
|
Sign up to set email alerts
|

ARMISTICE: Microarchitectural Leakage Modeling for Masked Software Formal Verification

Abstract: Side channel attacks are powerful attacks for retrieving secret data by exploiting physical measurements such as power consumption or electromagnetic emissions. Masking is a popular countermeasure as it can be proven secure against an attacker model. In practice, software masked implementations suffer from a security reduction due to a mismatch between the considered leakage sources in the security proof and the real ones, which depend on the micro-architecture. We propose ARMISTICE, a framework for formally v… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 32 publications
0
1
0
Order By: Relevance
“…As Gigerl et al point out, due to occurring glitches probing the output of the combinatorial forwarding logic, i.e., the output of the multiplexer in Figure 3, could give adversaries access to its inputs and thus to multiple values within the pipeline. Furthermore, Grandmaison et al [dGHM22] report that such a forwarding mechanism also exists for ARM processors.…”
Section: Pipeline Forwarding Effect (Pfe)mentioning
confidence: 99%
“…As Gigerl et al point out, due to occurring glitches probing the output of the combinatorial forwarding logic, i.e., the output of the multiplexer in Figure 3, could give adversaries access to its inputs and thus to multiple values within the pipeline. Furthermore, Grandmaison et al [dGHM22] report that such a forwarding mechanism also exists for ARM processors.…”
Section: Pipeline Forwarding Effect (Pfe)mentioning
confidence: 99%