2009
DOI: 10.1007/978-3-642-04138-9_12
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Method for Random Delay Generation in Embedded Software

Abstract: Abstract. Random delays are a countermeasure against a range of side channel and fault attacks that is often implemented in embedded software. We propose a new method for generation of random delays and a criterion for measuring the efficiency of a random delay countermeasure. We implement this new method along with the existing ones on an 8-bit platform and mount practical side-channel attacks against the implementations. We show that the new method is significantly more secure in practice than the previously… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
94
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 100 publications
(95 citation statements)
references
References 6 publications
1
94
0
Order By: Relevance
“…The empirical value does ont fit the theoretical value very well, because more leakages are not included in the leakage interval I with the floating mean DFS than uniform DFS. Compared to results in [7] with DPA where the ratio is 45000/2500 = 18, the PPSA gives much better results.…”
Section: Resultsmentioning
confidence: 70%
See 2 more Smart Citations
“…The empirical value does ont fit the theoretical value very well, because more leakages are not included in the leakage interval I with the floating mean DFS than uniform DFS. Compared to results in [7] with DPA where the ratio is 45000/2500 = 18, the PPSA gives much better results.…”
Section: Resultsmentioning
confidence: 70%
“…So the standard deviation of the overall delay σ Σ is much less than σ 0 , which leads to efficiency degeneration. The second DFS employs more efficient floating mean method [7] with parameters a and b. The standard deviation of the overall delay with the floating mean method does not diminish with accumulation.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…A common hardware defense against DPA is the introduction of RPIs [54]. Similarly, NOPs can be introduced as dummy operations in software to yield the same effect.…”
Section: Effective Countermeasuresmentioning
confidence: 99%
“…While the former is exemplified by mathematical and algorithmic augmentation, such as point or scalar blinding [6,Section 5] in Elliptic Curve Cryptography (ECC), the latter represents a more diverse range of techniques. For platforms based on a generalpurpose processor, one example is skewing [26,7] or shuffling [15] the instruction stream: the countermeasure is applied automatically by the processor, irrespective of the purpose of said instruction stream (e.g., whether it represents an implementation of AES or DES). On more hardware-oriented platforms, use of secure logic styles [22,23] and (ab)use of pipelined logic [20] represent other examples: again the idea is that the approaches are viable no matter what the logic computes, with the only requirement being it is pipelined at all in the latter case.…”
Section: Introductionmentioning
confidence: 99%