Evaluation Tools for Side-Channel Attacks: An Overview
نویسنده
چکیده
Side-channel attacks are an important concern for the security of cryptographic implementations and their fair evaluation is a challenge for the certification of cryptographic products. In this survey, I will tackle the question of the best methods and tools for the objective evaluation of leaking devices, and discuss their limitations. For this purpose, I will first attempt to define a side-channel adversary in function of different ingredients, e.g.
منابع مشابه
Side channel parameter characteristics of code injection attacks
Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...
متن کاملSide-Channel Attack Standard Evaluation Board SASEBO-W for Smartcard Testing
Side-channel Attack Standard Evaluation BOards (SASEBOs) were developed as uniform evaluation platforms for research purposes. Cryptographic hardware, and control circuits for side-channel experimentation were also developed, and these platforms have been distributed to the government, the industry and academic research labs in order to facilitate research and development directed toward the es...
متن کاملMaking Masking Security Proofs Concrete
We investigate the relationship between theoretical studies of leaking cryptographic devices and concrete security evaluations with standard side-channel attacks. Our contributions are in four parts. First, we connect the formal analysis of the masking countermeasure proposed by Duc et al. (Eurocrypt 2014) with the Eurocrypt 2009 evaluation framework for side-channel key recovery attacks. In pa...
متن کاملStatistical Tools Flavor Side-Channel Collision Attacks
By examining the similarity of side-channel leakages, collision attacks evade the indispensable hypothetical leakage models of multi-query based side-channel distinguishers like correlation power analysis and mutual information analysis attacks. Most of the side-channel collision attacks compare two selective observations, what makes them similar to simple power analysis attacks. A multi-query ...
متن کاملMaking Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device
We investigate the relationships between theoretical studies of leaking cryptographic devices and concrete security evaluations with standard side-channel attacks. Our contributions are in four parts. First, we connect the formal analysis of the masking countermeasure proposed by Duc et al. (Eurocrypt 2014) with the Eurocrypt 2009 evaluation framework for side-channel key recovery attacks. In p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011