Title :
Compiler-based side channel vulnerability analysis and optimized countermeasures application
Author :
Agosta, Giovanni ; Barenghi, Alessandro ; Maggi, Massimo ; Pelosi, Gianni
Author_Institution :
Dipt. di Elettron., Inf. e Bioingegneria - DEIB, Politec. di Milano, Milan, Italy
fDate :
May 29 2013-June 7 2013
Abstract :
Modern embedded systems manage sensitive data increasingly often through cryptographic primitives. In this context, side-channel attacks, such as power analysis, represent a concrete threat, regardless of the mathematical strength of a cipher. Evaluating the resistance against power analysis of cryptographic implementations and preventing it, are tasks usually ascribed to the expertise of the system designer. This paper introduces a new security-oriented data-flow analysis assessing the vulnerability level of a cipher with bit-level accuracy. A general and extensible compiler-based tool was implemented to assess the instruction resistance against power-based side-channels. The tool automatically instantiates the essential masking countermeasures, yielding a ×2.5 performance speedup w.r.t. protecting the entire code.
Keywords :
cryptography; data flow analysis; embedded systems; program compilers; cipher; compiler-based side channel vulnerability analysis; cryptographic primitives; embedded systems; optimized countermeasures application; security-oriented data flow analysis; side-channel attacks; Ciphers; Doped fiber amplifiers; Materials; Power demand; Resistance; Vectors; Power Analysis Attacks; Software Countermeasures; Static Analysis;
Conference_Titel :
Design Automation Conference (DAC), 2013 50th ACM/EDAC/IEEE
Conference_Location :
Austin, TX