Hardware private circuits: From trivial composition to full verification
The design of glitch-resistant higher-order masking schemes is an important challenge in
cryptographic engineering. A recent work by Moos et al.(CHES 2019) showed that most …
cryptographic engineering. A recent work by Moos et al.(CHES 2019) showed that most …
Real-world snapshots vs. theory: Questioning the t-probing security model
Due to its sound theoretical basis and practical efficiency, masking has become the most
prominent countermeasure to protect cryptographic implementations against physical side …
prominent countermeasure to protect cryptographic implementations against physical side …
VERICA-Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering
J Richter-Brockmann, J Feldtkeller, P Sasdrich… - Cryptology ePrint …, 2022 - eprint.iacr.org
Physical attacks, including passive Side-Channel Analysis and active Fault Injection
Analysis, are considered among the most powerful threats against physical cryptographic …
Analysis, are considered among the most powerful threats against physical cryptographic …
Cryptographic fault diagnosis using VerFI
Historically, fault diagnosis for integrated circuits has singularly dealt with reliability
concerns. In contrast, a cryptographic circuit needs to be primarily evaluated concerning …
concerns. In contrast, a cryptographic circuit needs to be primarily evaluated concerning …
[PDF][PDF] COCOALMA: A versatile masking verifier
Masking techniques are an effective countermeasure against power side-channel attacks.
Unfortunately, correctly masking a hardware circuit is difficult, and mistakes may lead to …
Unfortunately, correctly masking a hardware circuit is difficult, and mistakes may lead to …
SCInfer: Refinement-Based Verification of Software Countermeasures Against Side-Channel Attacks
Power side-channel attacks, capable of deducing secret using statistical analysis
techniques, have become a serious threat to devices in cyber-physical systems and the …
techniques, have become a serious threat to devices in cyber-physical systems and the …
Challenges and opportunities of security-aware EDA
J Feldtkeller, P Sasdrich, T Güneysu - ACM Transactions on Embedded …, 2023 - dl.acm.org
The foundation of every digital system is based on hardware in which security, as a core
service of many applications, should be deeply embedded. Unfortunately, the knowledge of …
service of many applications, should be deeply embedded. Unfortunately, the knowledge of …
A survey and perspective on artificial intelligence for security-aware electronic design automation
Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly
used in several fields to improve performance and the level of automation. In recent years …
used in several fields to improve performance and the level of automation. In recent years …
Verifying and quantifying side-channel resistance of masked software implementations
Power side-channel attacks, capable of deducing secret data using statistical analysis, have
become a serious threat. Random masking is a widely used countermeasure for removing …
become a serious threat. Random masking is a widely used countermeasure for removing …
fmdtools: A fault propagation toolkit for resilience assessment in early design
Incorporating resilience in design is important for the long-term viability of complex
engineered systems. Complex aerospace systems, for example, must ensure safety in the …
engineered systems. Complex aerospace systems, for example, must ensure safety in the …