You are looking at a specific version 20200525:121829 of this paper. See the latest version.

Paper 2019/1445

Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers

Madura A Shelton and Niels Samwel and Lejla Batina and Francesco Regazzoni and Markus Wagner and Yuval Yarom

Abstract

Since their introduction over two decades ago, physical side-channel attacks have presented a serious security threat. While many ciphers' implementations employ masking techniques to protect against such attacks, they often leak secret information due to unintended interactions in the hardware. We present Rosita, a code rewrite engine that uses a leakage emulator which we amended to correctly emulate the micro-architecture of a target system. We use Rosita to automatically protect masked implementations of AES and Xoodoo and show the absence of observable leakage at only a 25% penalty to the performance.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Preprint. MINOR revision.
Keywords
side channelspower analysisautomatic leakage mitigation
Contact author(s)
madura shelton @ adelaide edu au
nsamwel @ cs ru nl
lejla @ cs ru nl
regazzoni @ alari ch
markus wagner @ adelaide edu au
yval @ cs adelaide edu au
History
2020-11-19: last of 3 revisions
2019-12-12: received
See all versions
Short URL
https://ia.cr/2019/1445
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.