Design of a Set of Software Tools for Side-Channel Attacks

被引:0
|
作者
Fuentes, A. [1 ]
Hernandez, L. [1 ]
Martin, A. [1 ]
Alarcos, B. [2 ]
机构
[1] CSIC, Dept Tratamiento Informac & Criptog, Inst Tecnol Fis & Informac, Madrid, Spain
[2] Univ Alcala De Henares, Escuela Politecn Super, Dept Automat, Madrid, Spain
关键词
side channels; cryptography; software tools; security; PUBLIC-KEY CRYPTOSYSTEM;
D O I
10.1109/TLA.2015.7164224
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This contribution presents the design and the first experimental results of a set of software tools to carry out side-channel attacks against cryptographic devices, especially smartcards. To this aim, the main attacks of this class are commented, with special emphasis in power analysis attacks. The final objective is to make this set of tools available to the scientific community, so that it can be improved and enlarged according to particular needs.
引用
收藏
页码:1966 / 1978
页数:13
相关论文
共 50 条
  • [41] Side-Channel Attacks on Shared Search Indexes
    Wang, Liang
    Grubbs, Paul
    Lu, Jiahui
    Bindschaedler, Vincent
    Cash, David
    Ristenpart, Thomas
    [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 673 - 692
  • [42] Side-Channel Attacks on Mobile and Wearable Systems
    Nahapetian, Ani
    [J]. 2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,
  • [43] A Survey of Side-Channel Attacks on Caches and Countermeasures
    Yangdi Lyu
    Prabhat Mishra
    [J]. Journal of Hardware and Systems Security, 2018, 2 (1) : 33 - 50
  • [44] SonarSnoop: active acoustic side-channel attacks
    Cheng, Peng
    Bagci, Ibrahim Ethem
    Roedig, Utz
    Yan, Jeff
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (02) : 213 - 228
  • [45] A tutorial on physical security and side-channel attacks
    Koeune, F
    Standaert, FX
    [J]. FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 78 - 108
  • [46] Side-Channel Expectation-Maximization Attacks
    Béguinot, Julien
    Cheng, Wei
    Guilley, Sylvain
    Rioul, Olivier
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 774 - 799
  • [47] Side-Channel Attacks and Machine Learning Approach
    Levina, Alia
    Sleptsova, Daria
    Zaitsev, Oleg
    [J]. 2016 18TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION AND SEMINAR ON INFORMATION SECURITY AND PROTECTION OF INFORMATION TECHNOLOGY (FRUCT-ISPIT), 2016, : 181 - 186
  • [48] On the Feasibility of Side-Channel Attacks in a Virtualized Environment
    Vateva-Gurova, Tsvetoslava
    Luna, Jesus
    Pellegrino, Giancarlo
    Suri, Neeraj
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 319 - 339
  • [49] On the Correctness of an Approach against Side-Channel Attacks
    Wang, Peng
    Feng, Dengguo
    Wu, Wenling
    Zhang, Liting
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 336 - +
  • [50] How to Compare Profiled Side-Channel Attacks?
    Standaert, Francois-Xavier
    Koeune, Francois
    Schindler, Werner
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 485 - +