Automated Instantiation of Side-Channel Attacks Countermeasures for Software Cipher Implementations Position Paper

被引:1
|
作者
Agosta, Giovanni [1 ]
Barenghi, Alessandro [1 ]
Pelosi, Gerardo [1 ]
机构
[1] Politecn Milan, Dipartimento Elettron Informaz & Bioingn DEIB, Piazza Leonardo Vinci 32, I-20133 Milan, Italy
基金
欧盟地平线“2020”;
关键词
Design for security; Side channel attacks; compiler technology;
D O I
10.1145/2903150.2911707
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Side Channel Attacks (SCA) have proven to be a practical threat to the security of embedded systems, exploiting the information leakage coming from unintended channels concerning an implementation of a cryptographic primitive. Given the large variety of embedded platforms, and the ubiquity of the need for secure cryptographic implementations, a systematic and automated approach to deploy SCA countermeasures at design time is strongly needed. In this paper, we provide an overview of recent compiler-based techniques to protect software implementations against SCA, making them amenable to automated application in the development of secure-by-design systems.
引用
收藏
页码:455 / 460
页数:6
相关论文
共 50 条
  • [1] FPGA implementations of SPRING and their countermeasures against side-channel attacks
    Brenner, Hai
    Gaspar, Lubos
    Leurent, Gaëetan
    Rosen, Alon
    Standaert, François-Xavier
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 : 414 - 432
  • [2] FPGA Implementations of SPRING And Their Countermeasures against Side-Channel Attacks
    Brenner, Hai
    Gaspar, Lubos
    Leurent, Gaetan
    Rosen, Alon
    Standaert, Francois-Xavier
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014, 2014, 8731 : 414 - 432
  • [3] Formal Verification of Software Countermeasures against Side-Channel Attacks
    Eldib, Hassan
    Wang, Chao
    Schaumont, Patrick
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2014, 24 (02)
  • [4] Automated Software Protection for the Masses Against Side-Channel Attacks
    Belleville, Nicolas
    Courousse, Damien
    Heydemann, Karine
    Charles, Henri-Pierre
    ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2019, 15 (04)
  • [5] A Survey of Side-Channel Attacks on Caches and Countermeasures
    Yangdi Lyu
    Prabhat Mishra
    Journal of Hardware and Systems Security, 2018, 2 (1) : 33 - 50
  • [6] Algebraic side-channel attacks on Trivium stream cipher
    Sun, Wenlong
    Guan, Jie
    IET COMMUNICATIONS, 2024, 18 (19) : 1335 - 1347
  • [7] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [8] Threshold implementations against side-channel attacks and glitches
    Nikova, Svetla
    Rechberger, Christian
    Rijmen, Vincent
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 529 - +
  • [9] Side-Channel Attacks on Masked Bitsliced Implementations of AES
    Radulescu, Anca
    Choudary, Marios O.
    CRYPTOGRAPHY, 2022, 6 (03)
  • [10] Timing Side-channel Attacks and Countermeasures in CPU Microarchitectures
    Zhang, Jiliang
    Chen, Congcong
    Cui, Jinhua
    Li, Keqin
    ACM COMPUTING SURVEYS, 2024, 56 (07)