In his keynote speech at CHES 2004, Kocher advocated that side-channel attacks were an illustration that formal cryptography was not as secure as it was believed because some assumptions (e.g., no auxiliary information is available during the computation) were not modeled. This failure is caused by formal methods' focus on models rather than implementations. In this paper we present formal methods and tools for designing protected code and proving its security against power analysis. These formal methods avoid the discrepancy between the model and the implementation by working on the latter rather than on a high-level model. Indeed, our methods allow us (a) to automatically insert a power balancing countermeasure directly at the assembly level, and to prove the correctness of the induced code transformation; and (b) to prove that the obtained code is balanced with regard to a reasonable leakage model. We also show how to characterize the hardware to use the resources which maximize the relevancy of the model. The tools implementing our methods are then demonstrated in a case study on an 8-bit AVR smartcard for which we generate a provably protected present implementation that reveals to be at least 250 times more resistant to CPA attacks.
from HAL : Dernières publications http://ift.tt/1TtA8Z2
Home » Sciences de l'ingénieur » [hal-01164591] Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic
mercredi 17 juin 2015
[hal-01164591] Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic
lainnya dari HAL : Dernières publications, Sciences de l'ingénieur
- [hal-01316014] A Methodology for Quality Assessment in Collaborative Score Libraries
- [hal-01343121] Impact de la recherche d'amorces mutées sur les résultats d'analyses métagénomiques
- [hal-01313749] Temperature dependence of the particle/gas partition coefficient: An application to predict indoor gas-phase concentrations of semi-volatile organic compounds
- [hal-01308004] Impact of the French 3rd and 4th generation pill scare in women seeking termination of pregnancy
- [hal-01290932] An Extension of SPARQL with Fuzzy Navigational Capabilities for Querying Fuzzy RDF Data
- [hal-01343753] Frederic Lee and post-Keynesian pricing theory
- [hal-01305478] Prenatal stress and early-life exposure to fluoxetine have enduring effects on anxiety and hippocampal BDNF gene expression in adult male offspring
- [hal-01341197] Hole propagation in the Kitaev-Heisenberg model: From quasiparticles in quantum Néel states to non-Fermi liquid in the Kitaev phase
- [hal-01319873] Zwitterionic [4]helicene: a water-soluble and reversible pH-triggered ECD/CPL chiroptical switch in the UV and red spectral regions
- [hal-01343314] Bounded combinatorics and uniform models for hyperbolic 3-manifolds
- [hal-01059991] On a Fuzzy Algebra for Querying Graph Databases
- [hal-01093013] Evaluation and Improvement of a Transition Business Process: A Case Study guided by a Semantic Quality-based Approach
- [hal-01140195] Expression and Efficient Processing of Fuzzy Queries in a Graph Database Context
- [hal-01343348] D.1.3 – Protocols for emergent localities
Ditulis Oleh : Unknown // 04:39
Kategori:
Sciences de l'ingénieur
Inscription à :
Publier les commentaires (Atom)
0 commentaires:
Enregistrer un commentaire