Specification and verification of side-channel security for open-source processors via leakage contracts

Z Wang, G Mohr, K von Gleissenthall… - Proceedings of the …, 2023 - dl.acm.org
Leakage contracts have recently been proposed as a new security abstraction at the
Instruction Set Architecture (ISA) level. Leakage contracts aim to capture the information that …

[PDF][PDF] Whisperfuzz: White-box fuzzing for detecting and locating timing vulnerabilities in processors

P Borkar, C Chen, M Rostami, N Singh… - arXiv preprint arXiv …, 2024 - usenix.org
Timing vulnerabilities in processors have emerged as a potent threat. As processors are the
foundation of any computing system, identifying these flaws is imperative. Recently fuzzing …

Synthesizing hardware-software leakage contracts for RISC-V open-source processors

G Mohr, M Guarnieri, J Reineke - 2024 Design, Automation & …, 2024 - ieeexplore.ieee.org
Microarchitectural attacks compromise security by exploiting software-visible artifacts of
microarchitectural optimizations such as caches and speculative execution. Defending …

[PDF][PDF] Towards Achieving Provable Side-Channel Security in Practice.

S Belaïd, G Cassiers, C Mutschler, M Rivain… - IACR Cryptol. ePrint …, 2023 - iacr.steepath.eu
Physical side-channel attacks are powerful attacks that exploit a device's physical
emanations to break the security of cryptographic implementations. Many countermeasures …

A methodology to achieve provable side-channel security in real-world implementations

S Belaïd, G Cassiers, C Mutschler, M Rivain… - Cryptology ePrint …, 2023 - eprint.iacr.org
Physical side-channel attacks exploit a device's emanations to compromise the security of
cryptographic implementations. Many countermeasures have been proposed against these …

Closing the Gap: Leakage Contracts for Processors with Transitions and Glitches

J Haring, V Hadži, R Bloem - IACR Transactions on Cryptographic …, 2024 - tches.iacr.org
Security verification of masked software implementations of cryptographic algorithms must
account for microarchitectural side-effects of CPUs. Leakage contracts were proposed to …

Plan your defense: A comparative analysis of leakage detection methods on RISC-V cores

K Miteloudi, A Adhikary, N van Drueten… - Cryptology ePrint …, 2024 - eprint.iacr.org
Hardening microprocessors against side-channel attacks is a critical aspect of ensuring their
security. A key step in this process is identifying and mitigating “leaky” hardware modules …

[PDF][PDF] Verifiable Side-Channel Security

MO Gourjon - 2024 - tore.tuhh.de
The protection of cryptographic implementations against side-channel attacks is essential.
Side-channel attacks exploit the secret-dependent information contained in the power …

[PDF][PDF] Efficient and Secure Masking Schemes to Counteract Power Analysis Attacks in Practice

S Mangard - 2024 - barbara-gigerl.github.io
Embedded and IoT devices rely on cryptographic building blocks to protect sensitive user
data from unrestricted access. Cryptographic algorithms have been designed to provide …

Secure and Verified Cryptographic Implementations in the Random Probing Model

AR Taleb - 2023 - theses.hal.science
The masking countermeasure is among the most potent countermeasures to counteract side-
channel attacks. Leakage models have been exhibited to theoretically reason on the …