2018
DOI: 10.1007/978-3-319-96142-2_12
|View full text |Cite
|
Sign up to set email alerts
|

SCInfer: Refinement-Based Verification of Software Countermeasures Against Side-Channel Attacks

Abstract: Abstract. Power side-channel attacks, capable of deducing secret using statistical analysis techniques, have become a serious threat to devices in cyber-physical systems and the Internet of things. Random masking is a widely used countermeasure for removing the statistical dependence between secret data and sidechannel leaks. Although there are techniques for verifying whether software code has been perfectly masked, they are limited in accuracy and scalability. To bridge this gap, we propose a refinement-base… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
60
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 35 publications
(61 citation statements)
references
References 51 publications
(121 reference statements)
0
60
0
Order By: Relevance
“…All benchmarks are from public domain, and all of them are masked. The programs P1-P3, in particular, are protected by Boolean masking that previously has been verified [14,35,75]. The other programs, from Barthe et al [8], are masked multiplication [65], masked S-box [30], masked AES [30] and various masked MAC-Keccak functions [8].…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…All benchmarks are from public domain, and all of them are masked. The programs P1-P3, in particular, are protected by Boolean masking that previously has been verified [14,35,75]. The other programs, from Barthe et al [8], are masked multiplication [65], masked S-box [30], masked AES [30] and various masked MAC-Keccak functions [8].…”
Section: Methodsmentioning
confidence: 99%
“…While the time taken to complete type inference is not negligible, e.g., minutes for the larger programs, it is reasonable because we perform a much deeper program analysis than mere compilation. To put it into perspective, the heavy-weight formal verification approaches often take hours [35,75].…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…This approach is generally applicable, regardless of how the abstract state is defined and which algorithm is used to compute the fixed point. For example, the abstract state may model side effects on the cache or pipeline [48,49], the non-functional properties to be verified may be timing or power [17,22,60,64], and the abstract domain may be interval [14] or octagonal [41].…”
Section: Introductionmentioning
confidence: 99%