Please use this identifier to cite or link to this item:
https://hdl.handle.net/2440/133474
Citations | ||
Scopus | Web of Science® | Altmetric |
---|---|---|
?
|
?
|
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shelton, M.A. | - |
dc.contributor.author | Samwel, N. | - |
dc.contributor.author | Batina, L. | - |
dc.contributor.author | Regazzoni, F. | - |
dc.contributor.author | Wagner, M. | - |
dc.contributor.author | Yarom, Y. | - |
dc.date.issued | 2021 | - |
dc.identifier.citation | Proceedings of the 2021 Network and Distributed System Security Symposium, 2021, pp.23137-1-23137-17 | - |
dc.identifier.isbn | 1-891562-66-5 | - |
dc.identifier.isbn | 9781891562662 | - |
dc.identifier.uri | https://hdl.handle.net/2440/133474 | - |
dc.description.abstract | Since their introduction over two decades ago, sidechannel attacks have presented a serious security threat. While many ciphers’ implementations employ masking techniques to protect against such attacks, they often leak secret information due to unintended interactions in the hardware. We present ROSITA, a code rewrite engine that uses a leakage emulator which we amend to correctly emulate the micro-architecture of a target system. We use ROSITA to automatically protect masked implementations of AES, ChaCha, and Xoodoo. For AES and Xoodoo, we show the absence of observable leakage at 1 000 000 traces with less than 21% penalty to the performance. For ChaCha, which has significantly more leakage, ROSITA eliminates over 99% of the leakage, at a performance cost of 64%. | - |
dc.description.statementofresponsibility | Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom | - |
dc.language.iso | en | - |
dc.publisher | Internet Society | - |
dc.rights | Copyright © 2021 by the Internet Society. All rights reserved. This volume is published as a collective work. The Internet Society owns the copyright for this publication and the copyrights to the individual papers are retained by their respective author[s]. | - |
dc.source.uri | https://www.ndss-symposium.org/ndss2021/accepted-papers/ | - |
dc.title | ROSITA: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers | - |
dc.type | Conference paper | - |
dc.contributor.conference | Network and Distributed Systems Security Symposium (NDSS) (21 Feb 2021 - 25 Feb 2021 : virtual online) | - |
dc.identifier.doi | 10.14722/ndss.2021.23137 | - |
dc.relation.grant | http://purl.org/au-research/grants/arc/DE200101577 | - |
dc.relation.grant | http://purl.org/au-research/grants/arc/DP200102364 | - |
dc.relation.grant | http://purl.org/au-research/grants/arc/DP210102670 | - |
pubs.publication-status | Published | - |
dc.identifier.orcid | Shelton, M.A. [0000-0002-8352-3805] | - |
dc.identifier.orcid | Wagner, M. [0000-0002-3124-0061] | - |
dc.identifier.orcid | Yarom, Y. [0000-0003-0401-4197] | - |
Appears in Collections: | Computer Science publications |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.