Abstract
Over the last decades computer aided engineering (CAE) tools have been developed and improved in order to ensure a short time-to-market in the chip design business. Up to now, these design tools do not yet support a design strategy for the development of side-channel resistant hardware implementations. In this chapter we introduce a novel engineering framework named AMASIVE (Adaptable Modular Autonomous SIde-Channel Vulnerability Evaluator), which supports the designer in implementing side-channel hardened devices. An attacker model is introduced for the analysis and the evaluation of a given cryptographic design in regard to application-specific vulnerabilities and exploitations. We demonstrate its application to a hardware implementation of the block cipher PRESENT.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bayrak, A.G., Regazzoni, F., Brisk, P., Standaert, F.X., Ienne, P.: A first step towards automatic application of power analysis countermeasures. In: Stok, L., Dutt, N.D., Hassoun, S. (eds.) DAC, pp. 230–235. ACM (2011)
Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: Present: An ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007)
Elaabid, M.A., Guilley, S.: Practical improvements of profiled side-channel attacks on a hardware crypto-accelerator. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 243–260. Springer, Heidelberg (2010)
Mangard, S., Popp, T., Oswald, E.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer (2007)
Moss, A., Oswald, E., Page, D., Tunstall, M.: Automatic insertion of dpa countermeasures. IACR Cryptology ePrint Archive 2011, 412 (2011)
Moss, A., Oswald, E., Page, D., Tunstall, M.: Compiler assisted masking. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 58–75. Springer, Heidelberg (2012)
Standaert, F.X., Malkin, T., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443–461. Springer, Heidelberg (2009)
Zohner, M., Stöttinger, M., Huss, S.A., Stein, O.: An adaptable, modular, and autonomous side-channel vulnerability evaluator. In: HOST, pp. 43–48. IEEE (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Huss, S.A., Stöttinger, M., Zohner, M. (2013). AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework. In: Fischlin, M., Katzenbeisser, S. (eds) Number Theory and Cryptography. Lecture Notes in Computer Science, vol 8260. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-42001-6_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-42001-6_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-42000-9
Online ISBN: 978-3-642-42001-6
eBook Packages: Computer ScienceComputer Science (R0)