Dissemin is shutting down on January 1st, 2025

Published in

Proceedings of the 50th Annual Design Automation Conference on - DAC '13

DOI: 10.1145/2463209.2488833

Links

Tools

Export citation

Search in Google Scholar

Compiler-based Side Channel Vulnerability Analysis and Optimized Countermeasures Application

Proceedings article published in 2013 by Giovanni Agosta ORCID, Alessandro Barenghi, Massimo Maggi, Gerardo Pelosi
This paper was not found in any repository, but could be made available legally by the author.
This paper was not found in any repository, but could be made available legally by the author.

Full text: Unavailable

Green circle
Preprint: archiving allowed
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

Modern embedded systems manage sensitive data increasingly often through cryptographic primitives. In this context, side-channel attacks, such as power analysis, represent a concrete threat, regardless of the mathematical strength of a cipher. Evaluating the resistance against power analysis of cryptographic implementations and preventing it, are tasks usually ascribed to the expertise of the system designer. This paper introduces a new security-oriented data-flow analysis assessing the vulnerability level of a cipher with bit-level accuracy. A general and extensible compiler-based tool was implemented to assess the instruction resistance against power-based side-channels. The tool automatically instantiates the essential masking countermeasures, yielding a ×2.5 performance speedup w.r.t. protecting the entire code.