Virtual analysis and reduction of side-channel vulnerabilities of smartcards

被引:0
|
作者
den Hartog, J [1 ]
de Vink, E [1 ]
机构
[1] Univ Twente, Dept Comp Sci, Enschede, Netherlands
来源
关键词
smartcard; side-channel attack; power analysis; fault analysis; DPA; simulation; countermeasures; systematic hardening;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper focuses on the usability of the PINPAS tool. The PINPAS tool is an instruction-level interpreter for smartcard assembler languages, augmented with facilities to study side-channel vulnerabilities. The tool can simulate side-channel leakage and has a suite of utilities to analyze this. The usage of the tool, for the analysis of a cryptographic algorithm is illustrated using the standard AES and RSA. Vulnerabilities of the implementations are identified and protective measures added. It is argued, that the tool can be instrumental for the design and realization of secure smartcard implementations in a systematic way.
引用
收藏
页码:85 / 98
页数:14
相关论文
共 50 条
  • [21] Side-channel analysis of SEcube™ platform
    Bollo, Matteo
    Carelli, Alberto
    Di Carlo, Stefano
    Prinetto, Paolo
    2017 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS), 2017,
  • [22] Weakly Profiling Side-channel Analysis
    Wu, Lichao
    Perin, Guilherme
    Picek, Stjepan
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (03): : 707 - 730
  • [23] Use of simulators for side-channel analysis
    Veshchikov, Nikita
    Guilley, Sylvain
    2017 2ND IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2017, : 104 - 112
  • [24] Survey of Side-Channel Vulnerabilities for Short-Range Wireless Communication Technologies
    Beck, Shannon
    Raavi, Manohar
    Dale, Caleb
    Weishalla, Kaija
    Worrell, Brennan
    2024 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY, EIT 2024, 2024, : 450 - 456
  • [25] Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange Protocols
    Aysu, Aydin
    Tobah, Youssef
    Tiwari, Mohit
    Gerstlauer, Andreas
    Orshansky, Michael
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2018, : 81 - 88
  • [26] A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries
    Geimer, Antoine
    Vergnolle, Matheo
    Recoules, Frederic
    Daniel, Lesly-Ann
    Bardin, Sebastien
    Maurice, Clementine
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1690 - 1704
  • [27] Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries
    Wang, Wubing
    Zhang, Yinqian
    Lin, Zhiqiang
    PROCEEDINGS OF THE 22ND INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, 2019, : 443 - 457
  • [28] Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic
    Chen, Jia
    Feng, Yu
    Dillig, Isil
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 875 - 890
  • [29] Automated Black-Box Detection of Side-Channel Vulnerabilities in Web Applications
    Chapman, Peter
    Evans, David
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 263 - 274
  • [30] EM Side-Channel Attacks on Commercial Contact less Smartcards Using Low-Cost Equipment
    Kasper, Timo
    Oswald, David
    Paar, Christof
    INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 79 - 93