Dabosville et al., 2012 - Google Patents
A new second-order side channel attack based on linear regressionDabosville et al., 2012
View PDF- Document ID
- 17607723203415547414
- Author
- Dabosville G
- Doget J
- Prouff E
- Publication year
- Publication venue
- IEEE Transactions on Computers
External Links
Snippet
Since the preliminary works of Kocher et al. in the nineties, studying and enforcing the resistance of cryptographic implementations against side channel analysis (SCA) is became a dynamic and prolific area of embedded security. Stochastic attacks, introduced by …
- 230000000873 masking 0 abstract description 40
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7271—Fault verification, e.g. comparing two values which should be the same, unless a computational fault occurred
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7223—Randomisation as countermeasure against side channel attacks
- G06F2207/7233—Masking, e.g. (A**e)+r mod n
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Dabosville et al. | A new second-order side channel attack based on linear regression | |
| Reparaz et al. | Selecting time samples for multivariate DPA attacks | |
| Batina et al. | Mutual information analysis: a comprehensive study | |
| Doget et al. | Univariate side channel attacks and leakage modeling | |
| Gierlichs et al. | Revisiting higher-order DPA attacks: Multivariate mutual information analysis | |
| Standaert et al. | The world is not enough: Another look on second-order DPA | |
| Bhasin et al. | Side-channel leakage and trace compression using normalized inter-class variance | |
| Ding et al. | A statistical model for higher order DPA on masked devices | |
| CN108604981B (en) | Method and apparatus for estimating secret value | |
| Bruneau et al. | Stochastic collision attack | |
| Ouladj et al. | Side-channel analysis of embedded systems | |
| Aulbach et al. | Separating oil and vinegar with a single trace: side-channel assisted Kipnis-Shamir attack on UOV | |
| Pan et al. | Improving DPA by peak distribution analysis | |
| Oren et al. | Tolerant algebraic side-channel analysis of {AES} | |
| Levi et al. | Garbled Circuits from an SCA Perspective: Free XOR can be Quite Expensive... | |
| Zhang | On the exact relationship between the success rate of template attack and different parameters | |
| Veyrat-Charvillon et al. | Adaptive chosen-message side-channel attacks | |
| Hoang et al. | Deep learning enhanced side channel analysis on crystals-kyber | |
| Ming et al. | Revealing the weakness of addition chain based masked SBox implementations | |
| Martinasek et al. | Crucial pitfall of DPA Contest V4. 2 implementation | |
| Kamoun et al. | Experimental Implementation of 2ODPA attacks on AES design with flash-based FPGA Technology | |
| Zhang et al. | Template attack assisted linear cryptanalysis on outer rounds protected DES implementations | |
| Charlès et al. | LPN-based Attacks in the White-box Setting | |
| Aftowicz et al. | Clustering versus Statistical Analysis for SCA: when Machine Learning is Better | |
| Aljuffri et al. | Balanced Dual-Mask Protection Scheme for GIFT Cipher Against Power Attacks |