Design of a Set of Software Tools for Side-Channel Attacks

被引:0
|
作者
Fuentes, A. [1 ]
Hernandez, L. [1 ]
Martin, A. [1 ]
Alarcos, B. [2 ]
机构
[1] CSIC, Dept Tratamiento Informac & Criptog, Inst Tecnol Fis & Informac, Madrid, Spain
[2] Univ Alcala De Henares, Escuela Politecn Super, Dept Automat, Madrid, Spain
关键词
side channels; cryptography; software tools; security; PUBLIC-KEY CRYPTOSYSTEM;
D O I
10.1109/TLA.2015.7164224
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This contribution presents the design and the first experimental results of a set of software tools to carry out side-channel attacks against cryptographic devices, especially smartcards. To this aim, the main attacks of this class are commented, with special emphasis in power analysis attacks. The final objective is to make this set of tools available to the scientific community, so that it can be improved and enlarged according to particular needs.
引用
收藏
页码:1966 / 1978
页数:13
相关论文
共 50 条
  • [21] DRM to Counter Side-Channel Attacks?
    Benadjila, Ryad
    Billet, Olivier
    Francfort, Stanislas
    [J]. DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT, 2007, : 23 - 32
  • [22] Codes for Side-Channel Attacks and Protections
    Guilley, Sylvain
    Heuser, Annelie
    Rioul, Olivier
    [J]. CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 35 - 55
  • [23] Side-Channel Attacks in a Real Scenario
    Ming Tang
    Maixing Luo
    Junfeng Zhou
    Zhen Yang
    Zhipeng Guo
    Fei Yan
    Liang Liu
    [J]. Tsinghua Science and Technology, 2018, 23 (05) : 586 - 598
  • [24] Synthesis of Adaptive Side-Channel Attacks
    Quoc-Sang Phan
    Bang, Lucas
    Pasareanu, Corina S.
    Malacaria, Pasquale
    Bultan, Tevfik
    [J]. 2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 328 - 342
  • [25] Optimal Collision Side-Channel Attacks
    Glowacz, Cezary
    Grosso, Vincent
    [J]. SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 : 126 - 140
  • [26] Side-Channel Attacks: A Short Tour
    Piessens, Frank
    van Oorschot, Paul C.
    Piessens, Frank
    van Oorshot, Paul C.
    [J]. IEEE SECURITY & PRIVACY, 2024, 22 (02) : 75 - 80
  • [27] Cache Side-Channel Attacks and Defenses
    Zhang W.
    Bai L.
    Ling Y.
    Lan X.
    Jia X.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [28] Soft Analytical Side-Channel Attacks
    Veyrat-Charvillon, Nicolas
    Gerard, Benoit
    Standaert, Francois-Xavier
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 282 - 296
  • [29] A new countermeasure against side-channel attacks based on hardware-software co-design
    Lumbiarres-Lopez, Ruben
    Lopez-Garcia, Mariano
    Canto-Navarro, Enrique
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2016, 45 : 324 - 338
  • [30] Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies
    Wang, Chenggang
    Ninan, Mabon
    Reilly, Shane
    Ward, Joel
    Hawkins, William
    Wang, Boyang
    Emmert, John M.
    [J]. PROCEEDINGS OF THE 16TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2023, 2023, : 227 - 238