SMT-Based Verification of Software Countermeasures against Side-Channel Attacks

@inproceedings{Eldib2014SMTBasedVO,
  title={SMT-Based Verification of Software Countermeasures against Side-Channel Attacks},
  author={Hassan Eldib and Chao Wang and Patrick Schaumont},
  booktitle={TACAS},
  year={2014}
}
A common strategy for designing countermeasures against si de channel attacks is using randomization techniques to remove the statistical dependency between sensitive data and side-channel emissions. H wever, this process is both labor intensive and error prone, and currently, ther e is a lack of automated tools to formally access how secure a countermeasure really is. We propose the first SMT solver based method for formally verifying the secu rity of a countermeasures against such attacks. In… CONTINUE READING
Highly Cited
This paper has 37 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 25 extracted citations

Advances in Cryptology – EUROCRYPT 2018

Lecture Notes in Computer Science • 2018
View 6 Excerpts
Highly Influenced

Verified Proofs of Higher-Order Masking

IACR Cryptology ePrint Archive • 2015
View 4 Excerpts
Highly Influenced

References

Publications referenced by this paper.
Showing 1-10 of 19 references

Provably secure masking of AES

IACR Cryptology ePrint Archive • 2004
View 3 Excerpts
Highly Influenced

KeeLoq and Side-Channel Analysis-Evolution of an Attack

2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) • 2009
View 1 Excerpt

Abstraction Refinement for Large Scale Model Checking

Series on Integrated Circuits and Systems • 2006
View 1 Excerpt

Similar Papers

Loading similar papers…