VerMI: Verification Tool for Masked Implementations

被引:0
|
作者
Arribas, Victor [1 ]
Nikova, Svetla [1 ]
Rijmen, Vincent [1 ]
机构
[1] Katholieke Univ Leuven, Imec COSIC, Leuven, Belgium
基金
欧盟地平线“2020”;
关键词
VerMI; Masking; Side-Channel Analysis; Glitches; Formal Verification; Logic Simulator; Non-completeness; Uniformity;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Masking is a widely used countermeasure against Side-Channel Attacks, nonetheless, the implementation of these countermeasures is challenging. Experimental security evaluation requires special equipment, a considerable amount of time, and extensive technical knowledge. Therefore, to automate and to speed up this process, a formal verification can be performed to asses the security of a design. In this work we present VerMI, a verification tool in the form of a logic simulator that checks the properties defined in Threshold Implementations to address the security of a hardware implementation for meaningful orders of security. The tool is designed so that any masking scheme can be evaluated. It accepts combinational and sequential logic and is able to analyze an entire cipher in short time. With the tool we have managed to spot a flaw in the round-based KECCAK implementation by Gross et al., published in DSD 2017.
引用
收藏
页码:381 / 384
页数:4
相关论文
共 50 条
  • [41] A testbed validation tool for MANET implementations
    Lent, R
    MASCOTS 2005:13TH IEEE INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 2005, : 381 - 388
  • [42] Monte Carlo Testing and Verification of Numerical Algorithm Implementations
    Pokrajac, David D.
    Imran, Abdullah-Al-Zubaer
    Bakic, Predrag R.
    2015 12TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), 2015, : 56 - 59
  • [43] Automatic Verification of Finite Precision Implementations of Linear Controllers
    Park, Junkil
    Pajic, Miroslav
    Sokolsky, Oleg
    Lee, Insup
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, TACAS 2017, PT I, 2017, 10205 : 153 - 169
  • [44] A Verification framework for Analyzing Security Implementations in an Enterprise LAN
    Bera, P.
    Dasgupta, Pallab
    Ghosh, S. K.
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1008 - +
  • [45] Automated Verification of Real-World Cryptographic Implementations
    Tomb, Aaron
    IEEE SECURITY & PRIVACY, 2016, 14 (06) : 26 - 33
  • [46] A Generic Methodology for the Modular Verification of Security Protocol Implementations
    Arquint, Linard
    Schwerhoff, Malte
    Mehta, Vaibhav
    Mueller, Peter
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1377 - 1391
  • [47] Refinement-based verification of implementations of Stateflow charts
    Miyazawa, Alvaro
    Cavalcanti, Ana
    FORMAL ASPECTS OF COMPUTING, 2014, 26 (02) : 367 - 405
  • [48] Various implementations of advanced dynamic signature verification system
    Kim, Jin Whan
    Advances in Intelligent and Soft Computing, 2012, 166 AISC (VOL. 1): : 203 - 210
  • [49] Formal Verification of Security Policy Implementations in Enterprise Networks
    Bera, P.
    Ghosh, S. K.
    Dasgupta, Pallab
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2009, 5905 : 117 - +
  • [50] AnBx: Automatic generation and verification of security protocols implementations
    School of Computing Science, Newcastle University, Newcastle upon Tyne, United Kingdom
    Lect. Notes Comput. Sci., (156-173):