We present symbolic analysis techniques for detecting vulnerabilities that are due to adaptive side-channel attacks, and synthesizing inputs that exploit the identified vulnerabilities. We start with a symbolic attack model that encodes succinctly all the side-channel attacks that an adversary can make. Using symbolic execution over this model, we generate a set of mathematical constraints, where each constraint characterizes the set of secret values that lead to the same sequence of side-channel measurements. We then compute the optimal attack, i.e, the attack that yields maximum leakage over the secret, by solving an optimization problem over the computed constraints. We use information-theoretic concepts such as channel capacity and Shan...
International audienceThis article revisits side-channel analysis from the standpoint of coding theo...
Abstract. Algebraic side-channel attacks are a type of side-channel analysis which can recover the s...
Algebraic side-channel attacks (ASCA) are a method of cryptanalysis which allow performing key recov...
Software side-channel attacks are able to recover confidential information by observing non-function...
A crucial problem in software security is the detection of side-channels. Information gained by obse...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
Side-channel attacks allow adversaries to infer sensitive information from non-functional characteri...
We present a model of adaptive attacks which we combine with infor-mation-theoretic metrics to quant...
Most side-channel attacks that have been published in the open literature assume known-or chosen-mes...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
Many electronic systems contain implementations of cryptographic algorithms in order to provide secu...
Abstract. Most side-channel attacks that have been published in the open literature assume known- or...
peer reviewedSide-channel attacks are powerful tools for breaking systems that implement cryptograph...
Nearly twenty years ago the discovery of side channel attacks has warned the world that security is ...
Abstract. Algebraic side-channel attacks (ASCA) are a method of crypt-analysis which allow performin...
International audienceThis article revisits side-channel analysis from the standpoint of coding theo...
Abstract. Algebraic side-channel attacks are a type of side-channel analysis which can recover the s...
Algebraic side-channel attacks (ASCA) are a method of cryptanalysis which allow performing key recov...
Software side-channel attacks are able to recover confidential information by observing non-function...
A crucial problem in software security is the detection of side-channels. Information gained by obse...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
Side-channel attacks allow adversaries to infer sensitive information from non-functional characteri...
We present a model of adaptive attacks which we combine with infor-mation-theoretic metrics to quant...
Most side-channel attacks that have been published in the open literature assume known-or chosen-mes...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
Many electronic systems contain implementations of cryptographic algorithms in order to provide secu...
Abstract. Most side-channel attacks that have been published in the open literature assume known- or...
peer reviewedSide-channel attacks are powerful tools for breaking systems that implement cryptograph...
Nearly twenty years ago the discovery of side channel attacks has warned the world that security is ...
Abstract. Algebraic side-channel attacks (ASCA) are a method of crypt-analysis which allow performin...
International audienceThis article revisits side-channel analysis from the standpoint of coding theo...
Abstract. Algebraic side-channel attacks are a type of side-channel analysis which can recover the s...
Algebraic side-channel attacks (ASCA) are a method of cryptanalysis which allow performing key recov...