Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems 2017
DOI: 10.1145/3031836.3031838
|View full text |Cite
|
Sign up to set email alerts
|

Side-channel leakage aware instruction scheduling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…For example, it was shown in [16] that a masked hardware implementation of the AES can be broken by exploiting glitches at the outputs of logic gates. On the other hand, software implementations of masked ciphers can also be vulnerable to DPA attacks because of unintended violations of the independent leakage requirement mentioned above, typically caused by certain micro-architectural effects and features [4,18,21]. Therefore, it is important to check whether a masked implementation meets its theoretical security promises also in practice (i.e.…”
Section: Introductionmentioning
confidence: 99%
“…For example, it was shown in [16] that a masked hardware implementation of the AES can be broken by exploiting glitches at the outputs of logic gates. On the other hand, software implementations of masked ciphers can also be vulnerable to DPA attacks because of unintended violations of the independent leakage requirement mentioned above, typically caused by certain micro-architectural effects and features [4,18,21]. Therefore, it is important to check whether a masked implementation meets its theoretical security promises also in practice (i.e.…”
Section: Introductionmentioning
confidence: 99%
“…In [18,19], the authors prove that the computing platform reveals information on the Hamming distance between the contents of two independent destination registers of two subsequent instructions due to register file write-port sharing. This leakage (from an ISA point-of-view) breaks provably secure countermeasure schemes implemented with state of the art assembly code [18].…”
Section: Background and Related Workmentioning
confidence: 99%
“…This is usually done since micro-architectural level specification of CPUs may not be freely available or known. However, two works sharing our research direction [18,19] show unexpected leakage behaviors from software block ciphers implemented on an a AVR 8bit microcontroller explainable only with a more detailed execution model. In [18,19], the authors prove that the computing platform reveals information on the Hamming distance between the contents of two independent destination registers of two subsequent instructions due to register file write-port sharing.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Seuschek et al [SSG17] suggest use of leakage aware code generation [SSG17,Section 6]. This involves careful 1) scheduling (i.e., ordering) of instructions, and 2) register allocation informed by a leakage characterisation [SSG17, Section 4] which captures vulnerable instruction sequences.…”
Section: Countermeasuresmentioning
confidence: 99%