Compiler-based side channel vulnerability analysis and optimized countermeasures application. Agosta, G., Barenghi, A., Maggi, M., & Pelosi, G. In 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC), pages 1–6, May, 2013. doi abstract bibtex Modern embedded systems manage sensitive data increasingly often through cryptographic primitives. In this context, side-channel attacks, such as power analysis, represent a concrete threat, regardless of the mathematical strength of a cipher. Evaluating the resistance against power analysis of cryptographic implementations and preventing it, are tasks usually ascribed to the expertise of the system designer. This paper introduces a new security-oriented data-flow analysis assessing the vulnerability level of a cipher with bit-level accuracy. A general and extensible compiler-based tool was implemented to assess the instruction resistance against power-based side-channels. The tool automatically instantiates the essential masking countermeasures, yielding a ×2.5 performance speedup w.r.t. protecting the entire code.
@inproceedings{agosta_compiler-based_2013,
title = {Compiler-based side channel vulnerability analysis and optimized countermeasures application},
doi = {10.1145/2463209.2488833},
abstract = {Modern embedded systems manage sensitive data increasingly often through cryptographic primitives. In this context, side-channel attacks, such as power analysis, represent a concrete threat, regardless of the mathematical strength of a cipher. Evaluating the resistance against power analysis of cryptographic implementations and preventing it, are tasks usually ascribed to the expertise of the system designer. This paper introduces a new security-oriented data-flow analysis assessing the vulnerability level of a cipher with bit-level accuracy. A general and extensible compiler-based tool was implemented to assess the instruction resistance against power-based side-channels. The tool automatically instantiates the essential masking countermeasures, yielding a ×2.5 performance speedup w.r.t. protecting the entire code.},
booktitle = {2013 50th {ACM}/{EDAC}/{IEEE} {Design} {Automation} {Conference} ({DAC})},
author = {Agosta, G. and Barenghi, A. and Maggi, M. and Pelosi, G.},
month = may,
year = {2013},
keywords = {\#broken, Ciphers, Doped fiber amplifiers, Jab/\#DAC, Materials, Power Analysis Attacks, Power demand, Resistance, Software Countermeasures, Static Analysis, Vectors, cipher, compiler-based side channel vulnerability analysis, cryptographic primitives, cryptography, data flow analysis, embedded systems, optimized countermeasures application, program compilers, security-oriented data flow analysis, side-channel attacks},
pages = {1--6},
}
Downloads: 0
{"_id":"YMjwbcTvNQHXuJ2MZ","bibbaseid":"agosta-barenghi-maggi-pelosi-compilerbasedsidechannelvulnerabilityanalysisandoptimizedcountermeasuresapplication-2013","author_short":["Agosta, G.","Barenghi, A.","Maggi, M.","Pelosi, G."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Compiler-based side channel vulnerability analysis and optimized countermeasures application","doi":"10.1145/2463209.2488833","abstract":"Modern embedded systems manage sensitive data increasingly often through cryptographic primitives. In this context, side-channel attacks, such as power analysis, represent a concrete threat, regardless of the mathematical strength of a cipher. Evaluating the resistance against power analysis of cryptographic implementations and preventing it, are tasks usually ascribed to the expertise of the system designer. This paper introduces a new security-oriented data-flow analysis assessing the vulnerability level of a cipher with bit-level accuracy. A general and extensible compiler-based tool was implemented to assess the instruction resistance against power-based side-channels. The tool automatically instantiates the essential masking countermeasures, yielding a ×2.5 performance speedup w.r.t. protecting the entire code.","booktitle":"2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC)","author":[{"propositions":[],"lastnames":["Agosta"],"firstnames":["G."],"suffixes":[]},{"propositions":[],"lastnames":["Barenghi"],"firstnames":["A."],"suffixes":[]},{"propositions":[],"lastnames":["Maggi"],"firstnames":["M."],"suffixes":[]},{"propositions":[],"lastnames":["Pelosi"],"firstnames":["G."],"suffixes":[]}],"month":"May","year":"2013","keywords":"#broken, Ciphers, Doped fiber amplifiers, Jab/#DAC, Materials, Power Analysis Attacks, Power demand, Resistance, Software Countermeasures, Static Analysis, Vectors, cipher, compiler-based side channel vulnerability analysis, cryptographic primitives, cryptography, data flow analysis, embedded systems, optimized countermeasures application, program compilers, security-oriented data flow analysis, side-channel attacks","pages":"1–6","bibtex":"@inproceedings{agosta_compiler-based_2013,\n\ttitle = {Compiler-based side channel vulnerability analysis and optimized countermeasures application},\n\tdoi = {10.1145/2463209.2488833},\n\tabstract = {Modern embedded systems manage sensitive data increasingly often through cryptographic primitives. In this context, side-channel attacks, such as power analysis, represent a concrete threat, regardless of the mathematical strength of a cipher. Evaluating the resistance against power analysis of cryptographic implementations and preventing it, are tasks usually ascribed to the expertise of the system designer. This paper introduces a new security-oriented data-flow analysis assessing the vulnerability level of a cipher with bit-level accuracy. A general and extensible compiler-based tool was implemented to assess the instruction resistance against power-based side-channels. The tool automatically instantiates the essential masking countermeasures, yielding a ×2.5 performance speedup w.r.t. protecting the entire code.},\n\tbooktitle = {2013 50th {ACM}/{EDAC}/{IEEE} {Design} {Automation} {Conference} ({DAC})},\n\tauthor = {Agosta, G. and Barenghi, A. and Maggi, M. and Pelosi, G.},\n\tmonth = may,\n\tyear = {2013},\n\tkeywords = {\\#broken, Ciphers, Doped fiber amplifiers, Jab/\\#DAC, Materials, Power Analysis Attacks, Power demand, Resistance, Software Countermeasures, Static Analysis, Vectors, cipher, compiler-based side channel vulnerability analysis, cryptographic primitives, cryptography, data flow analysis, embedded systems, optimized countermeasures application, program compilers, security-oriented data flow analysis, side-channel attacks},\n\tpages = {1--6},\n}\n\n\n\n","author_short":["Agosta, G.","Barenghi, A.","Maggi, M.","Pelosi, G."],"key":"agosta_compiler-based_2013","id":"agosta_compiler-based_2013","bibbaseid":"agosta-barenghi-maggi-pelosi-compilerbasedsidechannelvulnerabilityanalysisandoptimizedcountermeasuresapplication-2013","role":"author","urls":{},"keyword":["#broken","Ciphers","Doped fiber amplifiers","Jab/#DAC","Materials","Power Analysis Attacks","Power demand","Resistance","Software Countermeasures","Static Analysis","Vectors","cipher","compiler-based side channel vulnerability analysis","cryptographic primitives","cryptography","data flow analysis","embedded systems","optimized countermeasures application","program compilers","security-oriented data flow analysis","side-channel attacks"],"metadata":{"authorlinks":{}},"html":""},"bibtype":"inproceedings","biburl":"https://bibbase.org/zotero/bxt101","dataSources":["Wsv2bQ4jPuc7qme8R"],"keywords":["#broken","ciphers","doped fiber amplifiers","jab/#dac","materials","power analysis attacks","power demand","resistance","software countermeasures","static analysis","vectors","cipher","compiler-based side channel vulnerability analysis","cryptographic primitives","cryptography","data flow analysis","embedded systems","optimized countermeasures application","program compilers","security-oriented data flow analysis","side-channel attacks"],"search_terms":["compiler","based","side","channel","vulnerability","analysis","optimized","countermeasures","application","agosta","barenghi","maggi","pelosi"],"title":"Compiler-based side channel vulnerability analysis and optimized countermeasures application","year":2013}