2013
DOI: 10.1007/978-3-642-40349-1_17
|View full text |Cite
|
Sign up to set email alerts
|

Sleuth: Automated Verification of Software Power Analysis Countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
42
0
2

Year Published

2014
2014
2020
2020

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 58 publications
(44 citation statements)
references
References 22 publications
0
42
0
2
Order By: Relevance
“…Sleuth [BRNI13] is a SAT-based methodology that outputs a hard yes/no answer to the question of whether the countermeasures are effective or not. A limitation of [BRNI13] is that it does not attempt to quantify the degree of (in)security. A first approximation to the problem was tackled in [EWTS14,ABMP13].…”
Section: Related Workmentioning
confidence: 99%
“…Sleuth [BRNI13] is a SAT-based methodology that outputs a hard yes/no answer to the question of whether the countermeasures are effective or not. A limitation of [BRNI13] is that it does not attempt to quantify the degree of (in)security. A first approximation to the problem was tackled in [EWTS14,ABMP13].…”
Section: Related Workmentioning
confidence: 99%
“…However, it becomes difficult to determine the effectiveness of this protection against other fault models -and, more largely, of any protections on large code -without the help of formal methods. There are different means to prove (security) properties: model checking [12], SAT [15], SMT [16], taint analysis [17], rewriting rules using modular arithmetic [6], use of a proof assistant like Coq [18], etc. Moro et al have proposed countermeasures and proved their tolerance against an instruction skip using model checking with BDD [12].…”
Section: Related Workmentioning
confidence: 99%
“…Another recent series of papers use type systems and SMT solvers for verifying whether cryptographic implementations are correctly masked [33,9,17]; in particular, Eldib and Wang [16] have developed a method for synthesis of masking countermeasures.…”
Section: Related Workmentioning
confidence: 99%