Quantitative information-flow analysis (QIF) offers methods for reasoning about information-theoretic confidentiality properties of programs. The measures used by QIF are associated with operational secu-rity guarantees such as lower bounds for the effort required to determine a secret by exhaustive search. Moreover, they can be concisely expressed in terms of programming language semantics, which enables one to leverage existing program analysis techniques for their computation. This talk reports on a line of work on techniques for the QIF analysis of cache and timing side-channels in implementations of cryptographic algorithms. Attacks exploiting these side-channels are highly effective [2, 3, 7], and most countermeasures against them are...
Abstract. Formal models that allow one to understand side-channel attacks and are also directly mean...
Abstract—We show that the amount of information about the key that an unknown-message attacker can e...
Performance has been and will continue to be a key criterion in the development of computer systems ...
Abstract—Cryptographic function implementations are known to leak information about private keys thr...
Cryptographic cores are known to leak information about their private key due to runtime variations,...
Software side-channel attacks are able to recover confidential information by observing non-function...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Side-channels are unanticipated information flows that present a significant threatto security of sy...
Abstract. We propose a novel approach for quantifying a system’s resis-tance to unknown-message side...
It is very difficult in real-time breaking the cryptographic algorithms used at present. The Classic...
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique a...
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long stand...
International audienceTiming-based side-channels play an important role in exposing the state of a p...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
International audienceUsing information-theoretic tools, this paper estab- lishes a mathematical lin...
Abstract. Formal models that allow one to understand side-channel attacks and are also directly mean...
Abstract—We show that the amount of information about the key that an unknown-message attacker can e...
Performance has been and will continue to be a key criterion in the development of computer systems ...
Abstract—Cryptographic function implementations are known to leak information about private keys thr...
Cryptographic cores are known to leak information about their private key due to runtime variations,...
Software side-channel attacks are able to recover confidential information by observing non-function...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Side-channels are unanticipated information flows that present a significant threatto security of sy...
Abstract. We propose a novel approach for quantifying a system’s resis-tance to unknown-message side...
It is very difficult in real-time breaking the cryptographic algorithms used at present. The Classic...
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique a...
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long stand...
International audienceTiming-based side-channels play an important role in exposing the state of a p...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
International audienceUsing information-theoretic tools, this paper estab- lishes a mathematical lin...
Abstract. Formal models that allow one to understand side-channel attacks and are also directly mean...
Abstract—We show that the amount of information about the key that an unknown-message attacker can e...
Performance has been and will continue to be a key criterion in the development of computer systems ...