Vade Mecum on Side-Channels Attacks and Countermeasures for the Designer and the Evaluator - Archive ouverte HAL Access content directly
Conference Papers Year : 2011

Vade Mecum on Side-Channels Attacks and Countermeasures for the Designer and the Evaluator

Abstract

Implementation-level attacks are nowadays well known and most designers of security embedded systems are aware of them. However, both the number of vulnerabilities and of protections have seriously grown since the first public reporting of these threats in 1996. It is thus difficult to assess the correct countermeasures association to cover all the possible attack pathes. The goal of this paper is to give a clear picture of the possible adequation between actual risks and mitigation techniques. A specific focus is made on two protection techniques addressing primarily side-channel attacks: masking and hiding. For the first time, we provide with a way to estimate a tradeoff depending on the environmental conditions (amount of noise) and on the designer skills (ability to balance the design). This tradeoff is illustrated in a decision diagram, helpful for the security designer to justify choices and to account for the cost overhead.
Fichier principal
Vignette du fichier
dtis2011.pdf (201.53 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-00579020 , version 1 (23-03-2011)
hal-00579020 , version 2 (07-04-2011)

Identifiers

Cite

Sylvain Guilley, Olivier Meynard, Maxime Nassar, Guillaume Duc, Philippe Hoogvorst, et al.. Vade Mecum on Side-Channels Attacks and Countermeasures for the Designer and the Evaluator. Design & Technology of Integrated Systems, Apr 2011, Athens, Greece. pp.6, ⟨10.1109/DTIS.2011.5941419⟩. ⟨hal-00579020v2⟩
355 View
510 Download

Altmetric

Share

Gmail Facebook X LinkedIn More