Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers

12/11/2019
by   Madura A Shelton, et al.
0

Since their introduction over two decades ago, physical side-channel attacks have presented a serious security threat. While many ciphers' implementations employ masking techniques to protect against such attacks, they often leak secret information due to unintended interactions in the hardware. We present Rosita, a code rewrite engine that uses a leakage emulator which we amended to correctly emulate the micro-architecture of a target system. We use Rosita to automatically protect a masked implementation of AES and show the absence of exploitable leakage at only a 11

READ FULL TEXT
research
07/04/2021

Real-time Detection and Adaptive Mitigation of Power-based Side-Channel Leakage in SoC

Power-based side-channel is a serious security threat to the System on C...
research
07/18/2023

From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake

It is universally acknowledged that Wi-Fi communications are important t...
research
08/27/2021

Dimming Down LED: An Open-source Threshold Implementation on Light Encryption Device (LED) Block Cipher

Lightweight block ciphers have been widely used in applications such as ...
research
12/28/2020

Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection

Data Loss/Leakage Prevention (DLP) continues to be the main issue for ma...
research
10/16/2018

Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks (Extended Version)

Efficient key management for automotive networks (CAN) is a critical ele...
research
06/06/2020

SCARL: Side-Channel Analysis with Reinforcement Learning on the Ascon Authenticated Cipher

Existing side-channel analysis techniques require a leakage model, in th...
research
04/17/2021

SoK: Design Tools for Side-Channel-Aware Implementions

Side-channel attacks that leak sensitive information through a computing...

Please sign up or login with your details

Forgot password? Click here to reset