DocumentCode :
104711
Title :
Automatic Application of Power Analysis Countermeasures
Author :
Bayrak, Ali Galip ; Regazzoni, Francesco ; Novo, David ; Brisk, Philip ; Standaert, Francois-Xavier ; Ienne, Paolo
Author_Institution :
Sch. of Comput. & Commun. Sci., Ecole Polytech. Fed. de Lausanne (EPFL), Lausanne, Switzerland
Volume :
64
Issue :
2
fYear :
2015
fDate :
Feb. 2015
Firstpage :
329
Lastpage :
341
Abstract :
We introduce a compiler that automatically inserts software countermeasures to protect cryptographic algorithms against power-based side-channel attacks. The compiler first estimates which instruction instances leak the most information through side-channels. This information is obtained either by dynamic analysis, evaluating an information theoretic metric over the power traces acquired during the execution of the input program, or by static analysis. As information leakage implies a loss of security, the compiler then identifies (groups of) instruction instances to protect with a software countermeasure such as random precharging or Boolean masking. As software protection incurs significant overhead in terms of cryptosystem runtime and memory usage, the compiler protects the minimum number of instruction instances to achieve a desired level of security. The compiler is evaluated on two block ciphers, AES and Clefia; our experiments demonstrate that the compiler can automatically identify and protect the most important instruction instances. To date, these software countermeasures have been inserted manually by security experts, who are not necessarily the main cryptosystem developers. Our compiler offers significant productivity gains for cryptosystem developers who wish to protect their implementations from side-channel attacks.
Keywords :
cryptography; data protection; program compilers; AES; Clefia; block ciphers; compiler; cryptographic algorithms protection; cryptosystem runtime; dynamic analysis; information leakage; information theoretic metric; instruction instances protection; memory usage; power analysis countermeasures; power-based side-channel attacks; side-channel attacks; software countermeasures; software protection; static analysis; Assembly; Computers; Cryptography; Sensitivity; Software; Side-channel attacks; compiler; power analysis attacks; software countermeasures;
fLanguage :
English
Journal_Title :
Computers, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9340
Type :
jour
DOI :
10.1109/TC.2013.219
Filename :
6671593
Link To Document :
بازگشت