首页> 外文会议>ACM/EDAC/IEEE Design Automation Conference >Compiler-based side channel vulnerability analysis and optimized countermeasures application
【24h】

Compiler-based side channel vulnerability analysis and optimized countermeasures application

机译:基于编译器的旁通道漏洞分析及优化对策应用

获取原文

摘要

Modern embedded systems manage sensitive data increasingly often through cryptographic primitives. In this context, side-channel attacks, such as power analysis, represent a concrete threat, regardless of the mathematical strength of a cipher. Evaluating the resistance against power analysis of cryptographic implementations and preventing it, are tasks usually ascribed to the expertise of the system designer. This paper introduces a new security-oriented data-flow analysis assessing the vulnerability level of a cipher with bit-level accuracy. A general and extensible compiler-based tool was implemented to assess the instruction resistance against power-based side-channels. The tool automatically instantiates the essential masking countermeasures, yielding a ×2.5 performance speedup w.r.t. protecting the entire code.
机译:现代嵌入式系统越来越多地通过加密原语来管理敏感数据。在这种情况下,不管密码的数学强度如何,诸如功率分析之类的旁信道攻击都构成了具体的威胁。评估和阻止对密码实现的功耗分析的抵抗力通常是系统设计人员的专长。本文介绍了一种新的面向安全的数据流分析,以位级别的准确性评估密码的漏洞级别。实施了一种基于通用且可扩展的基于编译器的工具,以评估针对基于功率的边通道的指令阻力。该工具会自动实例化基本的屏蔽对策,从而以w.r.t.的速度提高2.5倍的性能。保护整个代码。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号