An information-theoretic model for adaptive side-channel attacks
Top Cited Papers
- 28 October 2007
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 286-296
- https://doi.org/10.1145/1315245.1315282
Abstract
We present a model of adaptive side-channel attacks which we combine with information-theoretic metrics to quantify the information revealed to an attacker. This allows us to express an attacker's remaining uncertainty about a secret as a function of the number of side-channel measurements made. We present algorithms and approximation techniques for computing this measure. We also give examples of how they can be used to analyze the resistance of hardware implementations of cryptographic functions to both timing and power attacks.Keywords
This publication has 11 references indexed in Scilit:
- An interactive codesign environment for domain-specific coprocessorsACM Transactions on Design Automation of Electronic Systems, 2006
- Belief in Information FlowPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Quantitative Information Flow, Relations and Polymorphic TypesJournal of Logic and Computation, 2005
- Power estimation for cycle-accurate functional descriptions of hardwarePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Transforming out timing leaksPublished by Association for Computing Machinery (ACM) ,2000
- Secure information flow in a multi-threaded imperative languagePublished by Association for Computing Machinery (ACM) ,1998
- A survey of power estimation techniques in VLSI circuitsIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 1994
- Toward a Mathematical Foundation for Information Flow SecurityJournal of Computer Security, 1992
- On a Statistical Estimate for the Entropy of a Sequence of Independent Random VariablesTheory of Probability and Its Applications, 1959
- A Mathematical Theory of CommunicationBell System Technical Journal, 1948