Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/133474
Citations
Scopus Web of Science® Altmetric
?
?
Full metadata record
DC FieldValueLanguage
dc.contributor.authorShelton, M.A.-
dc.contributor.authorSamwel, N.-
dc.contributor.authorBatina, L.-
dc.contributor.authorRegazzoni, F.-
dc.contributor.authorWagner, M.-
dc.contributor.authorYarom, Y.-
dc.date.issued2021-
dc.identifier.citationProceedings of the 2021 Network and Distributed System Security Symposium, 2021, pp.23137-1-23137-17-
dc.identifier.isbn1-891562-66-5-
dc.identifier.isbn9781891562662-
dc.identifier.urihttps://hdl.handle.net/2440/133474-
dc.description.abstractSince their introduction over two decades ago, sidechannel attacks have presented a serious security threat. While many ciphers’ implementations employ masking techniques to protect against such attacks, they often leak secret information due to unintended interactions in the hardware. We present ROSITA, a code rewrite engine that uses a leakage emulator which we amend to correctly emulate the micro-architecture of a target system. We use ROSITA to automatically protect masked implementations of AES, ChaCha, and Xoodoo. For AES and Xoodoo, we show the absence of observable leakage at 1 000 000 traces with less than 21% penalty to the performance. For ChaCha, which has significantly more leakage, ROSITA eliminates over 99% of the leakage, at a performance cost of 64%.-
dc.description.statementofresponsibilityMadura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom-
dc.language.isoen-
dc.publisherInternet Society-
dc.rightsCopyright © 2021 by the Internet Society. All rights reserved. This volume is published as a collective work. The Internet Society owns the copyright for this publication and the copyrights to the individual papers are retained by their respective author[s].-
dc.source.urihttps://www.ndss-symposium.org/ndss2021/accepted-papers/-
dc.titleROSITA: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers-
dc.typeConference paper-
dc.contributor.conferenceNetwork and Distributed Systems Security Symposium (NDSS) (21 Feb 2021 - 25 Feb 2021 : virtual online)-
dc.identifier.doi10.14722/ndss.2021.23137-
dc.relation.granthttp://purl.org/au-research/grants/arc/DE200101577-
dc.relation.granthttp://purl.org/au-research/grants/arc/DP200102364-
dc.relation.granthttp://purl.org/au-research/grants/arc/DP210102670-
pubs.publication-statusPublished-
dc.identifier.orcidShelton, M.A. [0000-0002-8352-3805]-
dc.identifier.orcidWagner, M. [0000-0002-3124-0061]-
dc.identifier.orcidYarom, Y. [0000-0003-0401-4197]-
Appears in Collections:Computer Science publications

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.