Springer, Lecture Notes in Computer Science, p. 233-247, 2005
DOI: 10.1007/11586821_16
Full text: Download
An increasingly important design constraint for software run- ning on ubiquitous computing devices is security, particularly against physical methods such as side-channel attack. One well studied method- ology for defending against such attacks is the concept of indistinguish- able functions which leak no information about program control flow since all execution paths are computationally identical. However, the constructing such functions by hand is laborious and error prone as their complexity increases. We investigate techniques for automating this pro- cess and find that effective solutions can be constructed with only minor amounts of computational effort. Keywords. Side-channel Cryptanalysis, Simple Power Analysis, Coun- termeasures, Indistinguishable Operations.