Design of a Set of Software Tools for Side-Channel Attacks

被引:0
|
作者
Fuentes, A. [1 ]
Hernandez, L. [1 ]
Martin, A. [1 ]
Alarcos, B. [2 ]
机构
[1] CSIC, Dept Tratamiento Informac & Criptog, Inst Tecnol Fis & Informac, Madrid, Spain
[2] Univ Alcala De Henares, Escuela Politecn Super, Dept Automat, Madrid, Spain
关键词
side channels; cryptography; software tools; security; PUBLIC-KEY CRYPTOSYSTEM;
D O I
10.1109/TLA.2015.7164224
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This contribution presents the design and the first experimental results of a set of software tools to carry out side-channel attacks against cryptographic devices, especially smartcards. To this aim, the main attacks of this class are commented, with special emphasis in power analysis attacks. The final objective is to make this set of tools available to the scientific community, so that it can be improved and enlarged according to particular needs.
引用
收藏
页码:1966 / 1978
页数:13
相关论文
共 50 条
  • [1] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [2] Statistical Tools Flavor Side-Channel Collision Attacks
    Moradi, Amir
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 428 - 445
  • [3] Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
    Wichelmann, Jan
    Paetschke, Anna
    Wilke, Luca
    Eisenbarth, Thomas
    [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6789 - 6806
  • [4] Shielding Software From Privileged Side-Channel Attacks
    Dong, Xiaowan
    Shen, Zhuojia
    Criswell, John
    Cox, Alan L.
    Dwarkadas, Sandhya
    [J]. PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1441 - 1458
  • [5] Hardware/Software Cooperative Design Against Power Side-Channel Attacks on IoT Devices
    Yang, Mingyu
    Ahmed, Tanvir
    Inagaki, Saya
    Sakiyama, Kazuo
    Li, Yang
    Hara-Azumi, Yuko
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (09): : 16758 - 16768
  • [6] Formal Verification of Software Countermeasures against Side-Channel Attacks
    Eldib, Hassan
    Wang, Chao
    Schaumont, Patrick
    [J]. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2014, 24 (02)
  • [7] Survey on Software Side-channel Attacks in Trusted Execution Environment
    Yang F.
    Zhang Q.-Y.
    Shi Z.-P.
    Guan Y.
    [J]. Ruan Jian Xue Bao/Journal of Software, 2023, 34 (01): : 381 - 403
  • [8] Automated Software Protection for the Masses Against Side-Channel Attacks
    Belleville, Nicolas
    Courousse, Damien
    Heydemann, Karine
    Charles, Henri-Pierre
    [J]. ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2019, 15 (04)
  • [9] Thwarting Side-Channel Attacks
    Edwards, Chris
    [J]. COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 13 - 14
  • [10] Combined Side-Channel Attacks
    Elaabid, M. Abdelaziz
    Meynard, Olivier
    Guilley, Sylvain
    Danger, Jean-Luc
    [J]. INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 175 - 190