Protection of software algorithms executed on secure modules
نویسندگان
چکیده
Loop structures in software code may reveal essential information about implemented algorithms and their parameters, even if the observer has no knowledge about which instructions are executed. Regular patterns can for instance be observed in power consumption, instruction fetches in external memory, or radiated EM energy. This paper addresses the use of dummy operations to obscure the details of the algorithm executed by the processor. We show that for a particular class of dummy insertion strategies, a Viterbi decoder can fairly reliably distinguish dummy fetches from real instruction fetches. In the second part of this paper, we study strategies to choose dummy fetches from a more general model. For certain situations, the optimum protection strategy appears to be deterministic (as opposed to random). Moreover, we show that in such a case, it is fundamentally not possible to enhance the security of the implementation by keeping the strategy for generating dummy fetches secret to the attacker.
منابع مشابه
Secure Netword Communications and Secure Store & Forward Mechanisms with the SAP R/3 System
Information security and data protection is gaining more and more importance with business software such as R/3 because: • Business applications become "mission-critical" if companies carry out their most important business processes with them. • Programs and data are subject to a greater danger of loss, change and espionage in client/server environments than in mainframe based systems. • The d...
متن کاملSoftware security requirements in building automation
With today’s ongoing integration of heterogeneous building automation systems, increased comfort, energy efficiency, improved building management, sustainability as well as advanced applications such as active & assisted living scenarios become possible. Obviously, the demands – especially regarding security – increase: Secure communication becomes equally important as secure software being exe...
متن کاملStudy on the Structural Behaviour of the Topside Modules of FPSO under the Forces Exerted on the Ship Hull
The extraction of oil and gas from deep water is one of the most important challenges of the oil and gas industry today. FPSO is one of the leading platforms for deep waters. This study discussed the performance of FPSO deck modules under loads exerted on the hull of the ship. Modeling of the studied module was executed by SACS software and the effect of support using neoprene in the function o...
متن کاملTrustEYE.M4: Protecting the sensor - Not the camera
Images captured in camera networks are potentially privacy sensitive and therefore need protection. A critical aspect is where protection is applied – after transmission at the data center or preferably already on the camera. In this work we take on-camera protection a step further and propose to make privacy protection and security inherent features of the image sensing unit. Already within th...
متن کاملCourse Modules for Software Security
Each year the reported number of security vulnerabilities increases as does the sophistication of attacks to exploit these vulnerabilities. Most security vulnerabilities are the result of insecure coding practices. There is a critical need to increase the security education of computer science students, particularly in software security. We are designing course modules, to be used at the underg...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Future Generation Comp. Syst.
دوره 13 شماره
صفحات -
تاریخ انتشار 1997