Compiler-based side channel vulnerability analysis and optimized countermeasures application. Agosta, G., Barenghi, A., Maggi, M., & Pelosi, G. In 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC), pages 1–6, May, 2013.
doi  abstract   bibtex   
Modern embedded systems manage sensitive data increasingly often through cryptographic primitives. In this context, side-channel attacks, such as power analysis, represent a concrete threat, regardless of the mathematical strength of a cipher. Evaluating the resistance against power analysis of cryptographic implementations and preventing it, are tasks usually ascribed to the expertise of the system designer. This paper introduces a new security-oriented data-flow analysis assessing the vulnerability level of a cipher with bit-level accuracy. A general and extensible compiler-based tool was implemented to assess the instruction resistance against power-based side-channels. The tool automatically instantiates the essential masking countermeasures, yielding a ×2.5 performance speedup w.r.t. protecting the entire code.
@inproceedings{agosta_compiler-based_2013,
	title = {Compiler-based side channel vulnerability analysis and optimized countermeasures application},
	doi = {10.1145/2463209.2488833},
	abstract = {Modern embedded systems manage sensitive data increasingly often through cryptographic primitives. In this context, side-channel attacks, such as power analysis, represent a concrete threat, regardless of the mathematical strength of a cipher. Evaluating the resistance against power analysis of cryptographic implementations and preventing it, are tasks usually ascribed to the expertise of the system designer. This paper introduces a new security-oriented data-flow analysis assessing the vulnerability level of a cipher with bit-level accuracy. A general and extensible compiler-based tool was implemented to assess the instruction resistance against power-based side-channels. The tool automatically instantiates the essential masking countermeasures, yielding a ×2.5 performance speedup w.r.t. protecting the entire code.},
	booktitle = {2013 50th {ACM}/{EDAC}/{IEEE} {Design} {Automation} {Conference} ({DAC})},
	author = {Agosta, G. and Barenghi, A. and Maggi, M. and Pelosi, G.},
	month = may,
	year = {2013},
	keywords = {\#broken, Ciphers, Doped fiber amplifiers, Jab/\#DAC, Materials, Power Analysis Attacks, Power demand, Resistance, Software Countermeasures, Static Analysis, Vectors, cipher, compiler-based side channel vulnerability analysis, cryptographic primitives, cryptography, data flow analysis, embedded systems, optimized countermeasures application, program compilers, security-oriented data flow analysis, side-channel attacks},
	pages = {1--6},
}

Downloads: 0