• Aucun résultat trouvé

security against side channel attacks

FLUSH + PREFETCH: A Countermeasure Against Access-driven Cache-based Side-Channel Attacks

FLUSH + PREFETCH: A Countermeasure Against Access-driven Cache-based Side-Channel Attacks

... these attacks, numerous countermeasures have been proposed by modifying the components of system soft- ware, hardware or applications [22, 13, 14, 15, 21, 10, 35, ...the security-critical part of the ...

19

Template Attacks against ECC : practical implementation against Curve25519

Template Attacks against ECC : practical implementation against Curve25519

... Terms—Template Attacks, PCA, LDA, Asymmetric Cryptography, Curve25519, ECC, Constant Time, mbedTLS ...of security of their implementation. Among physical attacks, we can discern ...

11

Intrinsic Resiliency of S-boxes Against Side-Channel Attacks -Best And Worst Scenarios

Intrinsic Resiliency of S-boxes Against Side-Channel Attacks -Best And Worst Scenarios

... with side-channel ...the side-channel attack ...and side-channel ...some security bounds on side- channel attacks are close to the “easiest ...

17

SoC security: a war against side-channels

SoC security: a war against side-channels

... Counter-measures against some physical attacks are still unknown. 1.2 Side-channels An hardware device that can be physically accessed is especially vulnerable at its physical layer (of its OSI ...a ...

14

How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip

How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip

... protected against physical attacks. Most physical attacks are performed on low-end devices (mi- crocontrollers and smartcards) and we investigate if they can be transposed easily to high-end ...

17

High-Speed Ring Oscillator based Sensors for Remote Side-Channel Attacks on FPGAs

High-Speed Ring Oscillator based Sensors for Remote Side-Channel Attacks on FPGAs

... potential security threats that it may ...remote side- channel and fault attacks on other user assets located inside the fabric or in the surrounding ...for side-channel purposes ...

9

Codes for Side-Channel Attacks and Protections

Codes for Side-Channel Attacks and Protections

... Secure against First- and Second-order Zero-Offset ...circuit against hard- ware Trojan ...Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pages ...Protection ...

25

Soft Analytical Side-Channel Attacks

Soft Analytical Side-Channel Attacks

... for security evaluations. That is, are the security levels estimated with such tools close enough to the worst-case? In view of the previously listed qualities (and in particular, their excellent time ...

16

Security Evaluation Against Side-Channel Analysis at Compilation Time

Security Evaluation Against Side-Channel Analysis at Compilation Time

... the security level in terms of data complexity (number of traces to recover the key) is still increasing with parameter ...optimal attacks, with tradeoffs regarding data and computational complexities (as ...

24

Leakage Squeezing Countermeasure against High-Order Attacks

Leakage Squeezing Countermeasure against High-Order Attacks

... years, side channel attacks have been widely ...order attacks (2O-attacks) have been improved and successfully applied to break many masked implementa- ...hinder attacks of all ...

17

Evaluation of Countermeasure Implementations Based on Boolean Masking to Thwart Side-Channel Attacks

Evaluation of Countermeasure Implementations Based on Boolean Masking to Thwart Side-Channel Attacks

... Abstract—This paper presents hardware implementations of a DES cryptoprocessor with masking countermeasures and their evaluation against side-channel attacks (SCAs) in FPGAs. The masking ...

7

Automated Software Protection for the Masses Against Side-Channel Attacks

Automated Software Protection for the Masses Against Side-Channel Attacks

... Each of the polymorphic transformations used in isolation has a different impact on security (Fig. 5.) Register shuffling seems to have very little impact on the t-value on our platform but may be of interest for ...

26

Unified isolation architectures and mechanisms against side channel attacks for decentralized cloud infrastructures

Unified isolation architectures and mechanisms against side channel attacks for decentralized cloud infrastructures

... major security concerns, in particular, because resource sharing between several entities has a strong impact on isolation in such ...data security in a virtualized en- vironment such as the cloud, ...

138

Improving side-channel attacks against pairing-based cryptography

Improving side-channel attacks against pairing-based cryptography

... recent attacks against the discrete logarithm ...128-bit security level, the curves providing the most efficient implementation seem to be the KSS16 ...for side-channel attacks, ...

18

Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA

Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA

... of security, are simply not viable for certain application domains, such as cloud computing, where security repre- sents a trade-off with the fundamental economic model, which in this case, is based on ...

36

Multivariate multitarget high order side-channel attacks

Multivariate multitarget high order side-channel attacks

... systems against side-channel attacks, countermeasures need to be ...the security of these countermeasures and their combination ...template attacks for which one can split the ...

229

Physical functions: the common factor of side-channel and fault attacks?

Physical functions: the common factor of side-channel and fault attacks?

... Abstract. Security is a key component for information technologies and ...the security threats, a very important one is certainly due to vulnerabilities of the integrated circuits that implement ...

17

Side-Channel Indistinguishability

Side-Channel Indistinguishability

... dual distance d ⊥ C = 4. Still, if the exact mem- ber of the class remains secret, the masking can be proven unconditionally secure. If the code has been compromised (or is deliberately made public), then an attacker ...

15

Cache-Based Side-Channel Attacks Detection through Intel Cache Monitoring Technology and Hardware Performance Counters

Cache-Based Side-Channel Attacks Detection through Intel Cache Monitoring Technology and Hardware Performance Counters

... a) Intel Cache Monitoring Technology (CMT): Intel has introduced two features in processors to improve cache utilization: Cache Allocation Technology (CAT) and Cache Monitoring Technology (CMT). CAT is basically intended ...

12

Defending against side-channel attacks : DynamoREA

Defending against side-channel attacks : DynamoREA

... Since we need to maintain the ideal machine abstraction by ensuring that real time is less than ideal time at every observable action, to calculate ideal time a[r] ...

68

Show all 2867 documents...

Sujets connexes