Compiler techniques for the automated application of side-channel countermeasures on embedded devices
Michele Scandale
Deib PhD Student
DEIB - PT1 Room
September 7th, 2015
6.30 pm
Contanct:
Michele Scandale
Research Line:
System architectures
Deib PhD Student
DEIB - PT1 Room
September 7th, 2015
6.30 pm
Contanct:
Michele Scandale
Research Line:
System architectures
Sommario
Embedded hardware security shows a growing use of cryptographic techniques, with an increasing attention towards tamper resistant designs and countermeasures against side-channel attacks like power analysis and fault injection.
The classical countermeasures against power-based side channel analysis are based either on masking or on hiding principles.
A novel approach not based on these principles has been recently proposed: the idea of the countermeasure is to change dynamically the executed code with semantically equivalent snippets in such a way to prevent the design of power consumption models.
In this talk we will discuss compiler based techniques to automatically apply static lightweight countermeasures in order to limit the runtime overhead.
The classical countermeasures against power-based side channel analysis are based either on masking or on hiding principles.
A novel approach not based on these principles has been recently proposed: the idea of the countermeasure is to change dynamically the executed code with semantically equivalent snippets in such a way to prevent the design of power consumption models.
In this talk we will discuss compiler based techniques to automatically apply static lightweight countermeasures in order to limit the runtime overhead.