An inside job: Remote power analysis attacks on FPGAs

F Schellenberg, DRE Gnad, A Moradi… - IEEE Design & …, 2021 - ieeexplore.ieee.org
This article presents how programmable resources of an FPGA can be utilized to perform
side-channel attacks and reports practical examples of these attacks.-Rosario Cammarota …

[PDF][PDF] Composable masking schemes in the presence of physical defaults & the robust probing model

S Faust, V Grosso, SMD Pozo, C Paglialonga… - 2018 - repository.ubn.ru.nl
Composability and robustness against physical defaults (eg, glitches) are two highly
desirable properties for secure implementations of masking schemes. While tools exist to …

Making masking security proofs concrete: or how to evaluate the security of any leaking device

A Duc, S Faust, FX Standaert - … on the Theory and Applications of …, 2015 - Springer
We investigate the relationships between theoretical studies of leaking cryptographic
devices and concrete security evaluations with standard side-channel attacks. Our …

Sok: Design tools for side-channel-aware implementations

I Buhan, L Batina, Y Yarom, P Schaumont - … of the 2022 ACM on Asia …, 2022 - dl.acm.org
Side-channel attacks that leak sensitive information through a computing device's interaction
with its physical environment have proven to be a severe threat to devices' security …

Provably secure hardware masking in the transition-and glitch-robust probing model: Better safe than sorry

G Cassiers, FX Standaert - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
There exists many masking schemes to protect implementations of cryptographic operations
against side-channel attacks. It is common practice to analyze the security of these schemes …

Share-slicing: Friend or foe?

S Gao, B Marshall, D Page, E Oswald - IACR Transactions on …, 2020 - tches.iacr.org
Masking is a well loved and widely deployed countermeasure against side channel attacks,
in particular in software. Under certain assumptions (wrt independence and noise level) …

On the success rate of side-channel attacks on masked implementations: information-theoretical bounds and their practical usage

A Ito, R Ueno, N Homma - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
This study derives information-theoretical bounds of the success rate (SR) of side-channel
attacks on masked implementations. We first develop a communication channel model …

Automated generation of masked hardware

D Knichel, A Moradi, N Müller, P Sasdrich - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Masking has been recognized as a sound and secure countermeasure for cryptographic
implementations, protecting against physical side-channel attacks. Even though many …

Very high order masking: Efficient implementation and security evaluation

A Journault, FX Standaert - International Conference on Cryptographic …, 2017 - Springer
In this paper, we study the performances and security of recent masking algorithms
specialized to parallel implementations in a 32-bit embedded software platform, for the …

Miracle: Micro-architectural leakage evaluation

B Marshall, D Page, J Webb - Cryptology ePrint Archive, 2021 - eprint.iacr.org
In this paper, we describe an extensible experimental infrastructure and methodology for
evaluating the micro-architectural leakage, based on power consumption, which stems from …