Can Code Polymorphism Limit Information Leakage?

被引:0
|
作者
Amarilli, Antoine [1 ]
Mueller, Sascha [2 ]
Naccache, David [1 ]
Page, Daniel [3 ]
Rauzy, Pablo [1 ]
Tunstall, Michael [3 ]
机构
[1] Ecole Normale Super, Dept Informat, 45 Rue Ulm, F-75230 Paris 05, France
[2] Tech Univ Darmstadt, Security Engn Hochschulstrasse, D-64289 Darmstadt, Germany
[3] Univ Bristol, Bristol BS8 1UB, Avon, England
基金
英国工程与自然科学研究理事会;
关键词
POWER ANALYSIS; IMPLEMENTATION; AES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In addition to its usual complexity assumptions, cryptography silently assumes that information can be physically protected in a single location. As one can easily imagine, real-life devices are not ideal and information may leak through different physical side-channels. It is a known fact that information leakage is a function of both the executed code F and its input x. In this work we explore the use of polymorphic code as a way of resisting side channel attacks. We present experimental results with procedural and functional languages. In each case we rewrite the protected code code F-i before its execution. The outcome is a genealogy of programs F-0, F-1, . . . such that for all inputs x and for all indexes i not equal j double right arrow F-i(x) = F-j(x) and F-i not equal F-j. This is shown to increase resistance to side channel attacks.
引用
收藏
页码:1 / 21
页数:21
相关论文
共 50 条
  • [1] Can paternal leakage maintain sexually antagonistic polymorphism in the cytoplasm?
    Kuijper, B.
    Lane, N.
    Pomiankowski, A.
    [J]. JOURNAL OF EVOLUTIONARY BIOLOGY, 2015, 28 (02) : 468 - 480
  • [2] Sensitive information leakage analysis of database code by abstract interpretation
    Jana A.
    [J]. International Journal of Security and Networks, 2023, 18 (02) : 91 - 105
  • [3] Information Leakage Rate of Optical Code Division Multiple Access Network Using Wiretap Code
    Xu, Rongwo
    Sun, Leiming
    Ji, Jianhua
    Wang, Ke
    Song, Yufeng
    [J]. ENTROPY, 2023, 25 (10)
  • [4] Information Leakage Analysis of Complex C Code and Its application to OpenSSL
    Malacaria, Pasquale
    Tautchning, Michael
    DiStefano, Dino
    [J]. LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: FOUNDATIONAL TECHNIQUES, PT I, 2016, 9952 : 909 - 925
  • [5] Qualitative and Quantitative Analysis of Information Leakage in Java']Java Source Code
    Chen, Bo
    Xu, Da-wei
    Yu, Ling
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 338 - 342
  • [6] Side-Channel Information Leakage of Code-Based Masked Implementations
    Cheng, Wei
    Rioul, Olivier
    Liu, Yi
    Beguinot, Julien
    Guilley, Sylvain
    [J]. 2022 17TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT), 2022, : 51 - 56
  • [7] A multipurpose information engine that can go beyond the Carnot limit
    Rana, Shubhashis
    Jayannavar, A. M.
    [J]. JOURNAL OF STATISTICAL MECHANICS-THEORY AND EXPERIMENT, 2016,
  • [8] Can Peer Code Reviews be Exploited for Later Information Needs?
    Sutherland, Andrew
    Venolia, Gina
    [J]. 2009 31ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, COMPANION VOLUME, 2009, : 259 - +
  • [9] LEAKAGE SUPPRESSION IN THE TORIC CODE
    Suchara, Martin
    Cross, Andrew W.
    Gambetta, Jay M.
    [J]. QUANTUM INFORMATION & COMPUTATION, 2015, 15 (11-12) : 997 - 1016
  • [10] Leakage suppression in the toric code
    Suchara, Martin
    Cross, Andrew W.
    Gambetta, Jay M.
    [J]. Quantum Information and Computation, 2015, 15 (11-12): : 997 - 1016