首页 > 最新文献

International Workshop on Security Proofs for Embedded Systems最新文献

英文 中文
Constructing Sliding Windows Leak from Noisy Cache Timing Information of OSS-RSA 基于噪声的OSS-RSA缓存时间信息构造滑动窗泄漏
Pub Date : 2019-09-06 DOI: 10.29007/ws8z
Rei Ueno, J. Takahashi, Yu-ichi Hayashi, N. Homma
{"title":"Constructing Sliding Windows Leak from Noisy Cache Timing Information of OSS-RSA","authors":"Rei Ueno, J. Takahashi, Yu-ichi Hayashi, N. Homma","doi":"10.29007/ws8z","DOIUrl":"https://doi.org/10.29007/ws8z","url":null,"abstract":"","PeriodicalId":398629,"journal":{"name":"International Workshop on Security Proofs for Embedded Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134407082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones 摇滚PUFs:从不太安全的PUFs中制作可证明安全的PUFs
Pub Date : 2019-09-06 DOI: 10.29007/nbm3
F. Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, M. Tehranipoor
{"title":"Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones","authors":"F. Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, M. Tehranipoor","doi":"10.29007/nbm3","DOIUrl":"https://doi.org/10.29007/nbm3","url":null,"abstract":"","PeriodicalId":398629,"journal":{"name":"International Workshop on Security Proofs for Embedded Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134525743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Detection and Correction of Malicious and Natural Faults in Cryptographic Modules 密码模块中恶意和自然故障的检测与纠正
Pub Date : 2018-09-10 DOI: 10.29007/w37p
Batya Karp, Mael Gay, O. Keren, I. Polian
Today’s electronic systems must simultaneously fulfill strict requirements on security and reliability. In particular, their cryptographic modules are exposed to faults, which can be due to natural failures (e.g., radiation or electromagnetic noise) or malicious faultinjection attacks. We present an architecture based on a new class of error-detecting codes that combine robustness properties with a minimal distance. The new architecture guarantees (with some probability) the detection of faults injected by an intelligent and strategic adversary who can precisely control the disturbance. At the same time it supports automatic correction of low-multiplicity faults. To this end, we discuss an efficient technique to correct single errors while avoiding full syndrome analysis. We report experimental results obtained by physical fault injection on the SAKURA-G FPGA board.
当今的电子系统必须同时满足对安全性和可靠性的严格要求。特别是,它们的加密模块暴露于故障,这可能是由于自然故障(例如,辐射或电磁噪声)或恶意故障注入攻击。我们提出了一种基于一类新的错误检测代码的体系结构,它结合了鲁棒性和最小距离。新的结构保证(在一定的概率下)检测到由能够精确控制干扰的智能和战略对手注入的故障。同时支持对低多重故障的自动纠错。为此,我们讨论了一种有效的技术,以纠正单一的错误,同时避免全面的综合征分析。本文报道了在SAKURA-G FPGA板上进行物理故障注入的实验结果。
{"title":"Detection and Correction of Malicious and Natural Faults in Cryptographic Modules","authors":"Batya Karp, Mael Gay, O. Keren, I. Polian","doi":"10.29007/w37p","DOIUrl":"https://doi.org/10.29007/w37p","url":null,"abstract":"Today’s electronic systems must simultaneously fulfill strict requirements on security and reliability. In particular, their cryptographic modules are exposed to faults, which can be due to natural failures (e.g., radiation or electromagnetic noise) or malicious faultinjection attacks. We present an architecture based on a new class of error-detecting codes that combine robustness properties with a minimal distance. The new architecture guarantees (with some probability) the detection of faults injected by an intelligent and strategic adversary who can precisely control the disturbance. At the same time it supports automatic correction of low-multiplicity faults. To this end, we discuss an efficient technique to correct single errors while avoiding full syndrome analysis. We report experimental results obtained by physical fault injection on the SAKURA-G FPGA board.","PeriodicalId":398629,"journal":{"name":"International Workshop on Security Proofs for Embedded Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129762623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Non-Reversible Insertion Method for Hardware Trojans Based on Path Delay Faults 一种基于路径延迟故障的硬件木马不可逆插入方法
Pub Date : 2018-09-10 DOI: 10.29007/fxvv
Akira Ito, Rei Ueno, N. Homma, T. Aoki
This paper presents a non-reversible method for stealthily inserting hardware Trojan (HT) based on a path delay fault called Path Delay HT (PDHT). While PDHT is hardly detected by the conventional methods including Monte-Carlo tests, its practicality is still unclear because a rarely sensitized path used for PDHT is selected and exploited in a deterministic manner. Such deterministic method indicates that we can find possible PDHT-inserted paths by its reversed method. In addition, the conventional method uses a genetic algorithm to add extra delays onto the selected path for inducing a path delay fault, and therefore, we have a difficulty in evaluating the resistance/vulnerability of a circuit to PDHT. This paper first presents a new method for selecting sufficiently rare paths to insert PDHT at random. We then show that the detectability/stealthiness of PDHT is related to switching activity (i.e., glitch effect), and present a new systematic method for inducing a path delay fault instead of GA. We demonstrate through an experimental PDHT-insertion and a Monte-Carlo test that the PDHT inserted by our method is sufficiently undetectable in comparison with the conventional method.
提出了一种基于路径延迟故障的不可逆的硬件木马(HT)隐形插入方法,称为路径延迟HT (PDHT)。虽然包括蒙特卡罗测试在内的传统方法很难检测到PDHT,但其实用性仍然不清楚,因为PDHT使用的很少敏化的路径是确定的选择和利用。这种确定性方法表明,我们可以通过它的反向方法找到可能的pdht插入路径。此外,传统的方法使用遗传算法在选定的路径上增加额外的延迟以引起路径延迟故障,因此,我们很难评估电路对PDHT的电阻/脆弱性。本文首先提出了一种选择足够稀有路径来随机插入PDHT的新方法。然后,我们证明了PDHT的可检测性/隐身性与切换活动(即故障效应)有关,并提出了一种新的系统方法来诱导路径延迟故障,而不是遗传算法。我们通过实验PDHT插入和蒙特卡罗测试证明,与传统方法相比,我们的方法插入的PDHT是足够不可检测的。
{"title":"A Non-Reversible Insertion Method for Hardware Trojans Based on Path Delay Faults","authors":"Akira Ito, Rei Ueno, N. Homma, T. Aoki","doi":"10.29007/fxvv","DOIUrl":"https://doi.org/10.29007/fxvv","url":null,"abstract":"This paper presents a non-reversible method for stealthily inserting hardware Trojan (HT) based on a path delay fault called Path Delay HT (PDHT). While PDHT is hardly detected by the conventional methods including Monte-Carlo tests, its practicality is still unclear because a rarely sensitized path used for PDHT is selected and exploited in a deterministic manner. Such deterministic method indicates that we can find possible PDHT-inserted paths by its reversed method. In addition, the conventional method uses a genetic algorithm to add extra delays onto the selected path for inducing a path delay fault, and therefore, we have a difficulty in evaluating the resistance/vulnerability of a circuit to PDHT. This paper first presents a new method for selecting sufficiently rare paths to insert PDHT at random. We then show that the detectability/stealthiness of PDHT is related to switching activity (i.e., glitch effect), and present a new systematic method for inducing a path delay fault instead of GA. We demonstrate through an experimental PDHT-insertion and a Monte-Carlo test that the PDHT inserted by our method is sufficiently undetectable in comparison with the conventional method.","PeriodicalId":398629,"journal":{"name":"International Workshop on Security Proofs for Embedded Systems","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134132590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Side-Channel Assisted Malware Classifier with Gradient Descent Correction for Embedded Platforms 基于梯度下降校正的嵌入式平台侧信道辅助恶意分类器
Pub Date : 2018-09-10 DOI: 10.29007/5sdj
Manaar Alam, Debdeep Mukhopadhyay, S. Kadiyala, S. Lam, T. Srikanthan
Malware detection is still one of the difficult problems in computer security because of the occurrence of newer varieties of malware programs. There has been an enormous effort in developing a generalised solution to this problem, but a little has been done considering the security of resource constraint embedded devices. In this paper, we attempt to develop a lightweight malware detection tool designed specifically for embedded platforms using micro-architectural side-channel information obtained through Hardware Performance Counters (HPCs). The methodology aims to develop a distance metric, called λ, for a given program from a benign set of programs which are expected to execute in the embedded environment. The distance metric is decided based on observations from carefully chosen features, which are tuples of high-level system calls along with low-level HPC events. An ideal λ-value for a malicious program is 1, as opposed to 0 for a benign program. However, in reality, the efficacy of λ to classify a malware largely depends on the proper assignment of weights to the features. We employ a gradient-descent based learning mechanism to determine optimal choices for these weights. We justify through experimental results on an embedded Linux running on an ARM processor that such a side-channel based learning mechanism improves the classification accuracy significantly compared to an ad-hoc selection of the weights, and leads to significantly low false positives and false negatives in all our test cases.
由于恶意软件层出不穷,恶意软件检测仍然是计算机安全领域的难题之一。在开发这个问题的通用解决方案方面已经付出了巨大的努力,但是考虑到资源约束嵌入式设备的安全性,已经做了很少的工作。在本文中,我们尝试开发一种专为嵌入式平台设计的轻量级恶意软件检测工具,该工具使用通过硬件性能计数器(hpc)获得的微架构侧信道信息。该方法旨在开发一种称为λ的距离度量,用于预期在嵌入式环境中执行的一组良性程序的给定程序。距离度量是根据对精心选择的特性的观察决定的,这些特性是高级系统调用和低级HPC事件的元组。恶意程序的理想λ值为1,而良性程序的理想λ值为0。然而,在现实中,λ对恶意软件进行分类的有效性在很大程度上取决于对特征的适当权重分配。我们采用基于梯度下降的学习机制来确定这些权重的最优选择。我们通过在ARM处理器上运行的嵌入式Linux上的实验结果证明,与临时选择权重相比,这种基于侧信道的学习机制大大提高了分类准确性,并且在我们所有的测试用例中导致了非常低的误报和误报。
{"title":"Side-Channel Assisted Malware Classifier with Gradient Descent Correction for Embedded Platforms","authors":"Manaar Alam, Debdeep Mukhopadhyay, S. Kadiyala, S. Lam, T. Srikanthan","doi":"10.29007/5sdj","DOIUrl":"https://doi.org/10.29007/5sdj","url":null,"abstract":"Malware detection is still one of the difficult problems in computer security because of the occurrence of newer varieties of malware programs. There has been an enormous effort in developing a generalised solution to this problem, but a little has been done considering the security of resource constraint embedded devices. In this paper, we attempt to develop a lightweight malware detection tool designed specifically for embedded platforms using micro-architectural side-channel information obtained through Hardware Performance Counters (HPCs). The methodology aims to develop a distance metric, called λ, for a given program from a benign set of programs which are expected to execute in the embedded environment. The distance metric is decided based on observations from carefully chosen features, which are tuples of high-level system calls along with low-level HPC events. An ideal λ-value for a malicious program is 1, as opposed to 0 for a benign program. However, in reality, the efficacy of λ to classify a malware largely depends on the proper assignment of weights to the features. We employ a gradient-descent based learning mechanism to determine optimal choices for these weights. We justify through experimental results on an embedded Linux running on an ARM processor that such a side-channel based learning mechanism improves the classification accuracy significantly compared to an ad-hoc selection of the weights, and leads to significantly low false positives and false negatives in all our test cases.","PeriodicalId":398629,"journal":{"name":"International Workshop on Security Proofs for Embedded Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125141033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Attack-tree-based Threat Modeling of Medical Implants 基于攻击树的医疗植入物威胁建模
Pub Date : 2018-09-10 DOI: 10.29007/8gxh
M. Siddiqi, R. M. Seepers, Mohammad Hamad, V. Prevelakis, C. Strydis
Modern Implantable Medical Devices (IMDs) are low-power embedded systems with life-critical functionalities. Almost all of these devices are equipped with wirelesscommunication capabilities in order to aid in diagnosis, in updating the functional settings and firmware and so on, without any surgical procedure to perform these tasks manually. There is, thus, a rising trend towards increased connectivity of these devices. The downside of this trend is, however, a proportional increase in the attack surface that can be exploited by a malicious entity. In effect, threat modeling of IMDs becomes ever more important. This is reflected by an increase in the number of vulnerabilities being found consistently in the IMDs available in market. This paper proposes a threat-modeling analysis based on attack trees to evaluate the security of these devices. As an example, three recent lightweight IMD security protocols from literature are analyzed using this approach to demonstrate its effectiveness in suggesting security improvements.
现代植入式医疗设备(imd)是具有生命关键功能的低功耗嵌入式系统。几乎所有这些设备都配备了无线通信功能,以帮助诊断、更新功能设置和固件等,而无需任何外科手术来手动执行这些任务。因此,这些设备的连接性增加的趋势正在上升。然而,这种趋势的缺点是,恶意实体可以利用的攻击面会成比例地增加。实际上,imd的威胁建模变得越来越重要。这反映在市场上可用的imd中不断发现的漏洞数量的增加上。本文提出了一种基于攻击树的威胁建模分析方法来评估这些设备的安全性。作为一个例子,我们使用这种方法分析了文献中最近的三个轻量级IMD安全协议,以证明它在建议安全性改进方面的有效性。
{"title":"Attack-tree-based Threat Modeling of Medical Implants","authors":"M. Siddiqi, R. M. Seepers, Mohammad Hamad, V. Prevelakis, C. Strydis","doi":"10.29007/8gxh","DOIUrl":"https://doi.org/10.29007/8gxh","url":null,"abstract":"Modern Implantable Medical Devices (IMDs) are low-power embedded systems with life-critical functionalities. Almost all of these devices are equipped with wirelesscommunication capabilities in order to aid in diagnosis, in updating the functional settings and firmware and so on, without any surgical procedure to perform these tasks manually. There is, thus, a rising trend towards increased connectivity of these devices. The downside of this trend is, however, a proportional increase in the attack surface that can be exploited by a malicious entity. In effect, threat modeling of IMDs becomes ever more important. This is reflected by an increase in the number of vulnerabilities being found consistently in the IMDs available in market. This paper proposes a threat-modeling analysis based on attack trees to evaluate the security of these devices. As an example, three recent lightweight IMD security protocols from literature are analyzed using this approach to demonstrate its effectiveness in suggesting security improvements.","PeriodicalId":398629,"journal":{"name":"International Workshop on Security Proofs for Embedded Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123360776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
An Automated Framework for Exploitable Fault Identification in Block Ciphers - A Data Mining Approach 块密码中可利用故障识别的自动框架——一种数据挖掘方法
Pub Date : 2017-10-04 DOI: 10.29007/fmzl
Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, P. Dasgupta
Characterization of all possible faults in a cryptosystem exploitable for fault attacks is a problem which is of both theoretical and practical interest for the cryptographic community. The complete knowledge of exploitable fault space is desirable while designing optimal countermeasures for any given crypto-implementation. In this paper, we address the exploitable fault characterization problem in the context of Differential Fault Analysis (DFA) attacks on block ciphers. The formidable size of the fault spaces demands an automated albeit fast mechanism for verifying each individual fault instance and neither the traditional, cipher-specific, manual DFA techniques nor the generic and automated Algebraic Fault Attacks (AFA) [10] fulfill these criteria. Further, the diversified structures of different block ciphers suggest that such an automation should be equally applicable to any block cipher. This work presents an automated framework for DFA identification, fulfilling all aforementioned criteria, which, instead of performing the attack just estimates the attack complexity for each individual fault instance. A generic and extendable data-mining assisted dynamic analysis framework capable of capturing a large class of DFA distinguishers is devised, along with a graph-based complexity analysis scheme. The framework significantly outperforms another recently proposed one [6], in terms of attack class coverage and automation effort. Experimental evaluation on AES and PRESENT establishes the effectiveness of the proposed framework in detecting most of the known DFAs, which eventually enables the characterization of the exploitable fault space.
对密码系统中所有可能的可用于故障攻击的故障进行表征是密码学界在理论和实践上都感兴趣的问题。在为任何给定的加密实现设计最佳对策时,需要完全了解可利用的故障空间。在本文中,我们解决了分组密码差分故障分析(DFA)攻击背景下的可利用故障表征问题。故障空间的巨大规模需要一种自动化的快速机制来验证每个单独的故障实例,而传统的、特定于密码的手动DFA技术和通用的、自动化的代数故障攻击(AFA)[10]都不能满足这些标准。此外,不同分组密码的多样化结构表明,这种自动化应该同样适用于任何分组密码。这项工作提出了一个用于DFA识别的自动化框架,满足上述所有标准,而不是执行攻击,只是估计每个单独故障实例的攻击复杂性。设计了一个通用的、可扩展的数据挖掘辅助动态分析框架,能够捕获大量的DFA区分符,以及基于图的复杂性分析方案。在攻击类覆盖范围和自动化工作方面,该框架明显优于最近提出的另一个框架。对AES和PRESENT的实验评估证明了所提出的框架在检测大多数已知dfa方面的有效性,从而最终实现了可利用故障空间的表征。
{"title":"An Automated Framework for Exploitable Fault Identification in Block Ciphers - A Data Mining Approach","authors":"Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, P. Dasgupta","doi":"10.29007/fmzl","DOIUrl":"https://doi.org/10.29007/fmzl","url":null,"abstract":"Characterization of all possible faults in a cryptosystem exploitable for fault attacks is a problem which is of both theoretical and practical interest for the cryptographic community. The complete knowledge of exploitable fault space is desirable while designing optimal countermeasures for any given crypto-implementation. In this paper, we address the exploitable fault characterization problem in the context of Differential Fault Analysis (DFA) attacks on block ciphers. The formidable size of the fault spaces demands an automated albeit fast mechanism for verifying each individual fault instance and neither the traditional, cipher-specific, manual DFA techniques nor the generic and automated Algebraic Fault Attacks (AFA) [10] fulfill these criteria. Further, the diversified structures of different block ciphers suggest that such an automation should be equally applicable to any block cipher. This work presents an automated framework for DFA identification, fulfilling all aforementioned criteria, which, instead of performing the attack just estimates the attack complexity for each individual fault instance. A generic and extendable data-mining assisted dynamic analysis framework capable of capturing a large class of DFA distinguishers is devised, along with a graph-based complexity analysis scheme. The framework significantly outperforms another recently proposed one [6], in terms of attack class coverage and automation effort. Experimental evaluation on AES and PRESENT establishes the effectiveness of the proposed framework in detecting most of the known DFAs, which eventually enables the characterization of the exploitable fault space.","PeriodicalId":398629,"journal":{"name":"International Workshop on Security Proofs for Embedded Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127178321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes 屏蔽组合码侧信道电阻分析的符号方法
Pub Date : 2017-10-04 DOI: 10.29007/hhnf
Inès Ben El Ouahma, Quentin L. Meunier, K. Heydemann, Emmanuelle Encrenaz-Tiphène
Masking is a popular countermeasure against side-channel attacks, which randomizes secret data with random and uniform variables called masks. At software level, masking is usually added in the source code and its effectiveness needs to be verified. In this paper, we propose a symbolic method to verify side-channel robustness of masked programs. The analysis is performed at the assembly level since compilation and optimisations may alter the added protections. Our proposed method aims to verify that intermediate computations are statistically independent from secret variables using defined distribution inference rules. We verify the first round of a masked AES in 22s and show that some secure algorithms or source codes are not leakage-free in their assembly implementations.
掩蔽是一种流行的对抗侧信道攻击的对策,它使用称为掩码的随机和均匀变量随机化秘密数据。在软件级别,通常在源代码中添加掩码,并且需要验证其有效性。本文提出了一种符号方法来验证掩码程序的边信道鲁棒性。分析在程序集级别执行,因为编译和优化可能会更改添加的保护。我们提出的方法旨在使用定义的分布推理规则验证中间计算在统计上独立于秘密变量。我们在22s中验证了掩码AES的第一轮,并表明一些安全算法或源代码在其汇编实现中不是无泄漏的。
{"title":"Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes","authors":"Inès Ben El Ouahma, Quentin L. Meunier, K. Heydemann, Emmanuelle Encrenaz-Tiphène","doi":"10.29007/hhnf","DOIUrl":"https://doi.org/10.29007/hhnf","url":null,"abstract":"Masking is a popular countermeasure against side-channel attacks, which randomizes secret data with random and uniform variables called masks. At software level, masking is usually added in the source code and its effectiveness needs to be verified. In this paper, we propose a symbolic method to verify side-channel robustness of masked programs. The analysis is performed at the assembly level since compilation and optimisations may alter the added protections. Our proposed method aims to verify that intermediate computations are statistically independent from secret variables using defined distribution inference rules. We verify the first round of a masked AES in 22s and show that some secure algorithms or source codes are not leakage-free in their assembly implementations.","PeriodicalId":398629,"journal":{"name":"International Workshop on Security Proofs for Embedded Systems","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122037268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
International Workshop on Security Proofs for Embedded Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1