AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework
Over the last decades computer aided engineering (CAE) tools have been developed and improved in order to ensure a short time-to-market in the chip design business. Up to now, these design tools do not yet support a design strategy for the development of side-channel resistant hardware implementations. In this chapter we introduce a novel engineering framework named AMASIVE (Adaptable Modular Autonomous SIde-Channel Vulnerability Evaluator), which supports the designer in implementing side-channel hardened devices. An attacker model is introduced for the analysis and the evaluation of a given cryptographic design in regard to application-specific vulnerabilities and exploitations. We demonstrate its application to a hardware implementation of the block cipher PRESENT.
KeywordsSecurity Analysis Block Cipher Attack Model Leakage Model Hypothesis Function
Unable to display preview. Download preview PDF.
- 1.Bayrak, A.G., Regazzoni, F., Brisk, P., Standaert, F.X., Ienne, P.: A first step towards automatic application of power analysis countermeasures. In: Stok, L., Dutt, N.D., Hassoun, S. (eds.) DAC, pp. 230–235. ACM (2011)Google Scholar
- 4.Mangard, S., Popp, T., Oswald, E.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer (2007)Google Scholar
- 5.Moss, A., Oswald, E., Page, D., Tunstall, M.: Automatic insertion of dpa countermeasures. IACR Cryptology ePrint Archive 2011, 412 (2011)Google Scholar
- 8.Zohner, M., Stöttinger, M., Huss, S.A., Stein, O.: An adaptable, modular, and autonomous side-channel vulnerability evaluator. In: HOST, pp. 43–48. IEEE (2012)Google Scholar