首页> 外文会议>IMA International Conference on Cryptography and Coding >On the Automatic Construction of Indistinguishable Operations
【24h】

On the Automatic Construction of Indistinguishable Operations

机译:关于自动构建禁用运作

获取原文

摘要

An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel attack. One well studied methodology for defending against such attacks is the concept of indistinguishable functions which leak no information about program control flow since all execution paths are computationally identical. However, constructing such functions by hand becomes laborious and error prone as their complexity increases. We investigate techniques for automating this process and find that effective solutions can be constructed with only minor amounts of computational effort.
机译:在普遍存在的计算设备上运行的软件的越来越重要的设计约束是安全性,特别是对诸如侧通道攻击之类的物理方法。一个良好研究的针对这种攻击的捍卫方法是难以区分的函数的概念,其泄漏没有关于程序控制流程的信息,因为所有执行路径都是计算方式相同的。然而,随着它们的复杂性增加,手动构造这种功能变得艰巨,并且容易出错。我们调查了实现自动化此过程的技术,并发现只能以少量的计算工作构建有效的解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号