Abstract—Side-channel attacks have been a real threat against many critical embedded systems that rely on cryptographic algorithms as their security engine. A commonly used algorithmic countermeasure, random masking, incurs large execution delay and resource overhead. The other countermeasure, operation shuffling or permutation, can mitigate side-channel leakage ef-fectively with minimal overhead. In this paper, we target utilizing the independence among operations in cryptographic algorithms and randomizing their execution order. We design a tool to automatically detect such independence between statements at the source code level and devise an algorithm for automatic operation shuffling. We test our algorithm on the new SHA3 standard, Kec...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
Since 1996, numerous attacks have been shown to uncover secrets by exploiting a device's physical be...
Side-channel attacks have been a real threat against many critical embedded systems that rely on cry...
Together with masking, shuffling is one of the most frequently considered solutions to improve the s...
Abstract. Together with masking, shuffling is one of the most fre-quently considered solutions to im...
IoT devices have very strong requirements on all the resources such as memory, randomness, energy an...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
The modern, always-online world relies on numerous electronic devices. Ensuring the unobstructed ope...
Abstract—We introduce a compiler that automatically inserts software countermeasures to protect cryp...
We introduce a compiler that automatically inserts software countermeasures to protect cryptographic...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
Modern embedded systems manage sensitive data increasingly often through cryptographic primitives. I...
The sequential structure of some side-channel attacks makes them subject to error propagation, i.e. ...
The use of random permutation tables as a side-channel attack countermeasure was recently proposed b...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
Since 1996, numerous attacks have been shown to uncover secrets by exploiting a device's physical be...
Side-channel attacks have been a real threat against many critical embedded systems that rely on cry...
Together with masking, shuffling is one of the most frequently considered solutions to improve the s...
Abstract. Together with masking, shuffling is one of the most fre-quently considered solutions to im...
IoT devices have very strong requirements on all the resources such as memory, randomness, energy an...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
The modern, always-online world relies on numerous electronic devices. Ensuring the unobstructed ope...
Abstract—We introduce a compiler that automatically inserts software countermeasures to protect cryp...
We introduce a compiler that automatically inserts software countermeasures to protect cryptographic...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
Modern embedded systems manage sensitive data increasingly often through cryptographic primitives. I...
The sequential structure of some side-channel attacks makes them subject to error propagation, i.e. ...
The use of random permutation tables as a side-channel attack countermeasure was recently proposed b...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
Since 1996, numerous attacks have been shown to uncover secrets by exploiting a device's physical be...