[PDF][PDF] Formally Proved Security of Assembly Code Against Leakage.

P Rauzy, S Guilley, Z Najm - IACR Cryptol. ePrint Arch., 2013 - Citeseer
IACR Cryptol. ePrint Arch., 2013Citeseer
In his keynote speech at CHES 2004, Kocher advocated that sidechannel attacks were an
illustration that formal cryptography was not as secure as it was believed because some
assumptions (eg, no auxiliary information is available during the computation) were not
modeled. This failure is due to the fact that formal methods work with models rather than
implementations. Of course, we can use formal methods to prove non-functional security
properties such as the absence of side-channel leakages. But a common obstacle is that …
Abstract
In his keynote speech at CHES 2004, Kocher advocated that sidechannel attacks were an illustration that formal cryptography was not as secure as it was believed because some assumptions (eg, no auxiliary information is available during the computation) were not modeled. This failure is due to the fact that formal methods work with models rather than implementations. Of course, we can use formal methods to prove non-functional security properties such as the absence of side-channel leakages. But a common obstacle is that those properties are very low-level and appear incompatible with formalization. To avoid the discrepancy between the model and the implementation, we apply formal methods directly on the implementation. Doing so, we can formally prove that an assembly code is leak-free, provided that the hardware it runs on satisfies a finite (and limited) set of properties that we show are realistic. We apply this technique to prove that a Present implementation in 8 bit AVR assembly code is leak-free.
Citeseer
以上显示的是最相近的搜索结果。 查看全部搜索结果