2014
DOI: 10.1007/978-3-319-08867-9_8
|View full text |Cite
|
Sign up to set email alerts
|

Synthesis of Masking Countermeasures against Side Channel Attacks

Abstract: We propose a new synthesis method for generating countermeasures for cryptographic software code to mitigate power analysis based side channel attacks. Side channel attacks may arise when computers and microchips leak sensitive information about the software code and data that they process, e.g., through power dissipation or electromagnetic radiation. Such information leaks have been exploited in commercial systems in the embedded space. Our new method takes an unprotected C program as input and returns a func… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
67
0
1

Year Published

2014
2014
2020
2020

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 55 publications
(68 citation statements)
references
References 32 publications
0
67
0
1
Order By: Relevance
“…Another related line of research is automatically synthesizing countermeasures [1,7,9,16,25,44,54] as opposed to verifying them. While methods in [1,7,9,44] rely on compiler-like pattern matching, the ones in [16,25,54] use inductive program synthesis based on the SMT approach.…”
Section: Related Workmentioning
confidence: 99%
“…Another related line of research is automatically synthesizing countermeasures [1,7,9,16,25,44,54] as opposed to verifying them. While methods in [1,7,9,44] rely on compiler-like pattern matching, the ones in [16,25,54] use inductive program synthesis based on the SMT approach.…”
Section: Related Workmentioning
confidence: 99%
“…However, it becomes difficult to determine the effectiveness of this protection against other fault models -and, more largely, of any protections on large code -without the help of formal methods. There are different means to prove (security) properties: model checking [12], SAT [15], SMT [16], taint analysis [17], rewriting rules using modular arithmetic [6], use of a proof assistant like Coq [18], etc. Moro et al have proposed countermeasures and proved their tolerance against an instruction skip using model checking with BDD [12].…”
Section: Related Workmentioning
confidence: 99%
“…have proposed a SAT-based tool to determine which instruction of a Boolean program is sensitive to power-analysis, according to a Hamming weight uni-variate leakage model. Eldib et al later proposed a SMT-based technique to automatically build perfectly masked Boolean programs [16]. Both methods target side channel attacks and are limited to specific assembly codes.…”
Section: Related Workmentioning
confidence: 99%
“…Another recent series of papers use type systems and SMT solvers for verifying whether cryptographic implementations are correctly masked [33,9,17]; in particular, Eldib and Wang [16] have developed a method for synthesis of masking countermeasures.…”
Section: Related Workmentioning
confidence: 99%