Evaluation Tools for Side-Channel Attacks: An Overview

نویسنده

  • François-Xavier Standaert
چکیده

Side-channel attacks are an important concern for the security of cryptographic implementations and their fair evaluation is a challenge for the certification of cryptographic products. In this survey, I will tackle the question of the best methods and tools for the objective evaluation of leaking devices, and discuss their limitations. For this purpose, I will first attempt to define a side-channel adversary in function of different ingredients, e.g.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Side channel parameter characteristics of code injection attacks

Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...

متن کامل

Side-Channel Attack Standard Evaluation Board SASEBO-W for Smartcard Testing

Side-channel Attack Standard Evaluation BOards (SASEBOs) were developed as uniform evaluation platforms for research purposes. Cryptographic hardware, and control circuits for side-channel experimentation were also developed, and these platforms have been distributed to the government, the industry and academic research labs in order to facilitate research and development directed toward the es...

متن کامل

Making Masking Security Proofs Concrete

We investigate the relationship between theoretical studies of leaking cryptographic devices and concrete security evaluations with standard side-channel attacks. Our contributions are in four parts. First, we connect the formal analysis of the masking countermeasure proposed by Duc et al. (Eurocrypt 2014) with the Eurocrypt 2009 evaluation framework for side-channel key recovery attacks. In pa...

متن کامل

Statistical Tools Flavor Side-Channel Collision Attacks

By examining the similarity of side-channel leakages, collision attacks evade the indispensable hypothetical leakage models of multi-query based side-channel distinguishers like correlation power analysis and mutual information analysis attacks. Most of the side-channel collision attacks compare two selective observations, what makes them similar to simple power analysis attacks. A multi-query ...

متن کامل

Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device

We investigate the relationships between theoretical studies of leaking cryptographic devices and concrete security evaluations with standard side-channel attacks. Our contributions are in four parts. First, we connect the formal analysis of the masking countermeasure proposed by Duc et al. (Eurocrypt 2014) with the Eurocrypt 2009 evaluation framework for side-channel key recovery attacks. In p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011