• DocumentCode
    565111
  • Title

    A code morphing methodology to automate power analysis countermeasures

  • Author

    Agosta, Giovanni ; Barenghi, Alessandro ; Pelosi, Gerardo

  • Author_Institution
    Politec. di Milano, Milan, Italy
  • fYear
    2012
  • fDate
    3-7 June 2012
  • Firstpage
    77
  • Lastpage
    82
  • Abstract
    We introduce a general framework to automate the application of countermeasures against Differential Power Attacks aimed at software implementations of cryptographic primitives. The approach enables the generation of multiple versions of the code, to prevent an attacker from recognizing the exact point in time where the observed operation is executed and how such operation is performed. The strategy increases the effort needed to retrieve the secret key through hindering the formulation of a correct hypothetical consumption to be correlated with the power measurements. The experimental evaluation shows how a DPA attack against OpenSSL AES implementation on an industrial grade ARM-based SoC is hindered with limited performance overhead.
  • Keywords
    cryptography; microprocessor chips; system-on-chip; DPA attack; OpenSSL AES implementation; code morphing methodology; cryptographic primitives; differential power attacks; industrial grade ARM-based SoC; power analysis countermeasure automation; power measurements; secret key; Arrays; Correlation; Cryptography; Engines; Power measurement; Registers; Tiles; Dynamic Code Transformation; Polymorphic Code; Power Analysis Attacks; Software Countermeasures;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Design Automation Conference (DAC), 2012 49th ACM/EDAC/IEEE
  • Conference_Location
    San Francisco, CA
  • ISSN
    0738-100X
  • Print_ISBN
    978-1-4503-1199-1
  • Type

    conf

  • Filename
    6241493