Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Journal articles
  4. Automatic Application of Power Analysis Countermeasures
 
research article

Automatic Application of Power Analysis Countermeasures

Bayrak, Ali Galip  
•
Regazzoni, Francesco
•
Novo, David
Show more
2015
Ieee Transactions On Computers

We introduce a compiler that automatically inserts software countermeasures to protect cryptographic algorithms against power-based side-channel attacks. The compiler first estimates which instruction instances leak the most information through side-channels. This information is obtained either by dynamic analysis, evaluating an information theoretic metric over the power traces acquired during the execution of the input program, or by static analysis. As information leakage implies a loss of security, the compiler then identifies (groups of) instruction instances to protect with a software countermeasure such as random precharging or Boolean masking. As software protection incurs significant overhead in terms of cryptosystem runtime and memory usage, the compiler protects the minimum number of instruction instances to achieve a desired level of security. The compiler is evaluated on two block ciphers, AES and Clefia; our experiments demonstrate that the compiler can automatically identify and protect the most important instruction instances. To date, these software countermeasures have been inserted manually by security experts, who are not necessarily the main cryptosystem developers. Our compiler offers significant productivity gains for cryptosystem developers who wish to protect their implementations from side-channel attacks.

  • Details
  • Metrics
Type
research article
DOI
10.1109/Tc.2013.219
Web of Science ID

WOS:000348053400003

Author(s)
Bayrak, Ali Galip  
Regazzoni, Francesco
Novo, David
Brisk, Philip
Standaert, Francois-Xavier
Ienne, Paolo  
Date Issued

2015

Publisher

Institute of Electrical and Electronics Engineers

Published in
Ieee Transactions On Computers
Volume

64

Issue

2

Start page

329

End page

341

Subjects

Side-channel attacks

•

power analysis attacks

•

software countermeasures

•

compiler

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LAP  
Available on Infoscience
February 20, 2015
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/111246
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés