1092 articles – 619 Notices  [english version]
HAL : hal-00579020, version 2

Fiche détaillée  Récupérer au format
Design & Technology of Integrated Systems, Athens : Grèce (2011)
Versions disponibles :
Vade Mecum on Side-Channels Attacks and Countermeasures for the Designer and the Evaluator
Sylvain Guilley 1, Olivier Meynard 2, 3, Maxime Nassar 1, 2, Guillaume Duc 2, Philippe Hoogvorst 2, Houssem Maghrebi 1, Aziz Elaabid 2, Shivam Bhasin 2, Youssef Souissi 2, Nicolas Debande 2, Laurent Sauvage 1, Jean-Luc Danger 1

Implementation-level attacks are nowadays well known and most designers of security embedded systems are aware of them. However, both the number of vulnerabilities and of protections have seriously grown since the first public reporting of these threats in 1996. It is thus difficult to assess the correct countermeasures association to cover all the possible attack pathes. The goal of this paper is to give a clear picture of the possible adequation between actual risks and mitigation techniques. A specific focus is made on two protection techniques addressing primarily side-channel attacks: masking and hiding. For the first time, we provide with a way to estimate a tradeoff depending on the environmental conditions (amount of noise) and on the designer skills (ability to balance the design). This tradeoff is illustrated in a decision diagram, helpful for the security designer to justify choices and to account for the cost overhead.
1 :  Institut Télécom - Télécom ParisTech
Télécom ParisTech
2 :  Laboratoire Traitement et Communication de l'Information [Paris] (LTCI)
Télécom ParisTech – CNRS : UMR5141
3 :  DGA Maîtrise de l'information (DGA.MI)
Délégation Générale de l'Armement
Informatique/Cryptographie et sécurité
Implementation-level attacks – side-channel attacks – hiding and masking – leakage metric – comparison of countermeasures – decision diagram.
Liste des fichiers attachés à ce document : 
dtis2011.pdf(231.5 KB)