Specification and verification of side-channel security for open-source processors via leakage contracts
Z Wang, G Mohr, K von Gleissenthall… - Proceedings of the …, 2023 - dl.acm.org
Leakage contracts have recently been proposed as a new security abstraction at the
Instruction Set Architecture (ISA) level. Leakage contracts aim to capture the information that …
Instruction Set Architecture (ISA) level. Leakage contracts aim to capture the information that …
[PDF][PDF] Whisperfuzz: White-box fuzzing for detecting and locating timing vulnerabilities in processors
Timing vulnerabilities in processors have emerged as a potent threat. As processors are the
foundation of any computing system, identifying these flaws is imperative. Recently fuzzing …
foundation of any computing system, identifying these flaws is imperative. Recently fuzzing …
Synthesizing hardware-software leakage contracts for RISC-V open-source processors
Microarchitectural attacks compromise security by exploiting software-visible artifacts of
microarchitectural optimizations such as caches and speculative execution. Defending …
microarchitectural optimizations such as caches and speculative execution. Defending …
[PDF][PDF] Towards Achieving Provable Side-Channel Security in Practice.
Physical side-channel attacks are powerful attacks that exploit a device's physical
emanations to break the security of cryptographic implementations. Many countermeasures …
emanations to break the security of cryptographic implementations. Many countermeasures …
A methodology to achieve provable side-channel security in real-world implementations
Physical side-channel attacks exploit a device's emanations to compromise the security of
cryptographic implementations. Many countermeasures have been proposed against these …
cryptographic implementations. Many countermeasures have been proposed against these …
Closing the Gap: Leakage Contracts for Processors with Transitions and Glitches
Security verification of masked software implementations of cryptographic algorithms must
account for microarchitectural side-effects of CPUs. Leakage contracts were proposed to …
account for microarchitectural side-effects of CPUs. Leakage contracts were proposed to …
Plan your defense: A comparative analysis of leakage detection methods on RISC-V cores
K Miteloudi, A Adhikary, N van Drueten… - Cryptology ePrint …, 2024 - eprint.iacr.org
Hardening microprocessors against side-channel attacks is a critical aspect of ensuring their
security. A key step in this process is identifying and mitigating “leaky” hardware modules …
security. A key step in this process is identifying and mitigating “leaky” hardware modules …
[PDF][PDF] Verifiable Side-Channel Security
MO Gourjon - 2024 - tore.tuhh.de
The protection of cryptographic implementations against side-channel attacks is essential.
Side-channel attacks exploit the secret-dependent information contained in the power …
Side-channel attacks exploit the secret-dependent information contained in the power …
[PDF][PDF] Efficient and Secure Masking Schemes to Counteract Power Analysis Attacks in Practice
S Mangard - 2024 - barbara-gigerl.github.io
Embedded and IoT devices rely on cryptographic building blocks to protect sensitive user
data from unrestricted access. Cryptographic algorithms have been designed to provide …
data from unrestricted access. Cryptographic algorithms have been designed to provide …
Secure and Verified Cryptographic Implementations in the Random Probing Model
AR Taleb - 2023 - theses.hal.science
The masking countermeasure is among the most potent countermeasures to counteract side-
channel attacks. Leakage models have been exhibited to theoretically reason on the …
channel attacks. Leakage models have been exhibited to theoretically reason on the …