maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults

53Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Power and electromagnetic based side-channel attacks are serious threats against the security of cryptographic embedded devices. In order to mitigate these attacks, implementations use countermeasures, among which masking is currently the most investigated and deployed choice. Unfortunately, commonly studied forms of masking rely on underlying assumptions that are difficult to satisfy in practice. This is due to physical defaults, such as glitches or transitions, which can recombine the masked data in a way that concretely reduces an implementation’s security. We develop and implement an automated approach for verifying security of masked implementations in presence of physical defaults (glitches or transitions). Our approach helps to recover the main strengths of masking: rigorous foundations, composability guarantees, automated verification under more realistic assumptions. Our work follows the approach of (Barthe et al. EUROCRYPT 2015) and thus contributes to demonstrate the benefits of language-based approaches (specifically probabilistic information flow) for masking.

Cite

CITATION STYLE

APA

Barthe, G., Belaïd, S., Cassiers, G., Fouque, P. A., Grégoire, B., & Standaert, F. X. (2019). maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11735 LNCS, pp. 300–318). Springer. https://doi.org/10.1007/978-3-030-29959-0_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free