Compiler Assisted Masking
نویسندگان
چکیده
Differential Power Analysis (DPA) attacks find a statistical correlation between the power consumption of a cryptographic device and intermediate values within the computation. Randomization via (Boolean) masking of intermediate values breaks this statistical dependence and thus prevents such attacks (at least up to a certain order). Especially for software implementations, (first-order) masking schemes are popular in academia and industry, albeit typically not as the sole countermeasure. The current practice then is to manually ‘insert’ Boolean masks: essentially software developers need to manipulate low-level assembly language to implement masking. In this paper we make a first step to automate this process, at least for first-order Boolean masking, allowing the development of compilers capable of protecting programs against DPA.
منابع مشابه
Masking the Energy Behavior of Encryption Algorithms
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has drawn a lot of negative publicity for smart card usage. The power measurement techniques rely on the data-dependent energy behavior of the underlying system. Further, power analysis can be used to identify the specific ...
متن کاملSegmentation Assisted Object Distinction for Direct Volume Rendering
Ray Casting is a direct volume rendering technique for visualizing 3D arrays of sampled data. It has vital applications in medical and biological imaging. Nevertheless, it is inherently open to cluttered classification results. It suffers from overlapping transfer function values and lacks a sufficiently powerful voxel parsing mechanism for object distinction. In this work, we are proposing an ...
متن کاملJust-in-Time Compiler Assisted Object Reclamation and Space Reuse
Garbage collection consumes significant overhead to reclaim memory used by dead (i.e., unreachable) objects in applications. This paper explores techniques for compiler assisted object reclamation and allocation on an actual JVM. Thereinto, the just-in-time compiler identifies dead objects using pointer and escape analysis combining liveness information and inserts calls to free them. The garba...
متن کاملImage Enhancement Using an Adaptive Un-sharp Masking Method Considering the Gradient Variation
Technical limitations in image capturing usually impose defective, such as contrast degradation. There are different approaches to improve the contrast of an image. Among the exiting approaches, un-sharp masking is a popular method due to its simplicity in implementation and computation. There is an important parameter in un-sharp masking, named gain factor, which affects the quality of the enh...
متن کاملEnergy Efficient Computing through Compiler Assisted Dynamic Specialization
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
متن کامل