Published in

Springer, Lecture Notes in Computer Science, p. 233-247, 2005

DOI: 10.1007/11586821_16

Links

Tools

Export citation

Search in Google Scholar

On the automatic construction of indistinguishable operations

Proceedings article published in 2005 by Manuel Barbosa, Dan Page
This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Red circle
Preprint: archiving forbidden
Orange circle
Postprint: archiving restricted
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

An increasingly important design constraint for software run- ning on ubiquitous computing devices is security, particularly against physical methods such as side-channel attack. One well studied method- ology for defending against such attacks is the concept of indistinguish- able functions which leak no information about program control flow since all execution paths are computationally identical. However, the constructing such functions by hand is laborious and error prone as their complexity increases. We investigate techniques for automating this pro- cess and find that effective solutions can be constructed with only minor amounts of computational effort. Keywords. Side-channel Cryptanalysis, Simple Power Analysis, Coun- termeasures, Indistinguishable Operations.