Risultati finali
This deliverable will explain the use of the novel leakage simulation technique and its potential for integration with dynamic testing of code (i.e. compilation and testing); it will be targeted to developers in the IoT domain.
Interim report on shortcut formulasThis deliverable will explain the use of shortcut formulas to make statements about leakage properties of implementations.
White Paper on Assurance in Security EvaluationsThis is an external deliverable written in the style of a white paper. It will summarise findings around the statistical confidence issues and the optimality of the evaluation approaches. A particular focus will be set on listing the parts of an evaluation that can be efficiently automated and the ones that require expert engineers.
White paper on shortcut formulasThis deliverable is based on D2.1 but will explain the use of shortcut formulas to make statements about leakage properties of implementations to non-experts.
Data management planPolicy for the management of research data generated during the project.
Interim portfolio of best methods and improved evaluation techniquesThis deliverable will provide an update on the portfolio of improved evaluation techniques and their figures of merit.
Report on automationThis is an update and final version of D2.2.
Report on instruction level profilingThis deliverable will detail the methodologies to create accurate instruction-level profiles, illustrated on the example of a popular processor (we envision to base our work on the ARM Cortex-M0.
Interim report on automationThis deliverable will describe which evaluation steps can be safely automated and how.
Final report on standardizationThis deliverable covers the effort by the consortium regarding standardisation in over the entire project. It will be publicly available and hence outline the activities and progress without revealing confidential information from the previous deliverables.
Final report on automationUpdate of D2.5 addressing Deep Learning methods.
Final report on toolsThis deliverable will summarise all work done with regards to producing practically relevant tools. It is intended to be a technical description and discuss implementation options taken alongside the analytical (i.e. theoretical) progress made on a level that is accessible for the relevant stakeholders. It will also communicate how these tools can be used effectively and place considerable emphasis on communicating best practice with regards to producing reliable evidence for the the effectiveness of ‘new attacks’.
White Paper on Evaluation Strategies for AES and ECC.This is a deliverable written in the style of a white paper. It will summarise definitions and metrics, and give guidance as to how they can be usefully employed in practical evaluations. It will also contain proposals for sound evaluation strategies for some implementation options of AES and ECC. The document will be aimed at practitioners working in industry as well as evaluation labs, and it will be publicised via the appropriate venues.
Report on dissemination activitiesReport summarizing the other dissemination activities foreseen by the dissemination plan (cf. Sec. 2.2.1), such as publications, actions towards specific stake holders (JHAS, EMVco, . . . ), yearly briefings, etc.
Final project reportThis final report will comply with the Guidance Notes on Project Reporting for H2020 Collaborative Projects, i.e. “A final publishable summary report, a plan for use and dissemination of foreground and a report on societal implications shall be established at the end of the project. The publishable summary should address a wide audience, including the general public and the final report on use and dissemination of foreground should, where appropriate, be an update of the initial plan in Annex I for use and dissemination of foreground and be consistent with the report on societal implications on the use and dissemination of foreground”.
Final portfolio of best methods and improved evaluation techniquesThis deliverable will provide the final portfolio of improved evaluation techniques and their figures of merit.
This deliverable contains several data sets of ECC implementations. A data set consists of a description of the device under attack, implementation archtitectures, measurement parameters, alongside leakage traces, inputs/outputs, and used randomness.
SCA TrainingAdvanced SCA training course integrating new evaluation techniques, as described in Sec. 2.2.1
Data sets for AES implementationsThis deliverable contains several data sets for AES implementations. A data set consists of a description of the device under attack, implementation architecture, measurement parameters, alongside leakage traces, inputs/outputs, and used randomness.
Dissemination WorkshopDedicated workshop for dissemination and feedback collection and joint Walk & Explore session.
Web site and repository for information and distribution of results, publication and tools. It will first be put online at M04 and will be regularly updated throughout the project.
This deliverable represent the final release of the leakage simulation and fault simulation tool(s).
Prototype SimulatorThis deliverable contains a first prototype of a leakage simulator, i.e. a software tool that takes in a (high-level) description of e.g. AES and produces leakage traces given some definend characteristics.
Pubblicazioni
Autori:
Eleonora Cagli, Cécile Dumas, Emmanuel Prouff
Pubblicato in:
CHES 2017, 2017, Pagina/e 45-68
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-66787-4_3
Autori:
Anthony Journault, François-Xavier Standaert
Pubblicato in:
CHES 2017, Numero Lecture Notes in Computer Science - 10529, 2017, Pagina/e 623-643, ISBN 978-3-319-66786-7
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-66787-4_30
Autori:
Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang
Pubblicato in:
SAC 2017, 2017, Pagina/e 442-458
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-72565-9_23
Autori:
Romain Poussier, Qian Guo, François-Xavier Standaert, Claude Carlet, Sylvain Guilley
Pubblicato in:
CRYPTO 2017, 2017, Pagina/e 123-141
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-75208-2_8
Autori:
Santos Merino del Pozo, François-Xavier Standaert
Pubblicato in:
COSADE 2017, Numero Lecture Notes in Computer Science - 10348, 2017, Pagina/e 264-281, ISBN 978-3-319-64646-6
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-64647-3_16
Autori:
A. Adam Ding, Liwei Zhang, Francois Durvaux, Francois-Xavier Standaert, Yunsi Fei
Pubblicato in:
CARDIS 2017, Numero Lecture Notes in Computer Sciences 10728, 2017, Pagina/e 105-122
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-75208-2_7
Autori:
Romain Poussier, Yuanyuan Zhou, François-Xavier Standaert
Pubblicato in:
CARDIS 2017, Numero Lecture Notes in Computer Sciences 10529, 2017, Pagina/e 534-554
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-66787-4_26
Autori:
Erick Nascimento, Łukasz Chmielewski
Pubblicato in:
CARDIS 2017, 2017, Pagina/e 213-231
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-75208-2_13
Autori:
David McCann, Elisabeth Oswald, Carolyn Whitnall
Pubblicato in:
USENIX Security Symposium 2017, 2017
Editore:
USENIX
Autori:
Moradi Amir, Richter Bastian, Schneider Tobias, Standaert François-Xavier
Pubblicato in:
CHES 2018, Numero IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol.2018, N°1, 2018, Pagina/e 209-237
Editore:
Springer International Publishing
DOI:
10.13154/tches.v2018.i1.209-237
Autori:
Vincent Grosso, François-Xavier Standaert
Pubblicato in:
EUROCRYPT 2018, Numero Lecture Notes in Computer Science - 10821, 2018, Pagina/e 385-412, ISBN 978-3-319-78374-1
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-78375-8_13
Autori:
Melissa Azouaoui, Romain Poussier, François-Xavier Standaert, Vincent Verneuil
Pubblicato in:
Proceedings of CARDIS 2019, 2019, Pagina/e 15 pages
Editore:
IACR Cryptology ePrint Atchive
Autori:
Loïc Masure, Cécile Dumas, Emmanuel Prouff
Pubblicato in:
Constructive Side-Channel Analysis and Secure Design - 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3–5, 2019, Proceedings, Numero 11421, 2019, Pagina/e 145-167, ISBN 978-3-030-16349-5
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-16350-1_9
Autori:
Loïc Masure, Cécile Dumas, Emmanuel prouff
Pubblicato in:
IACR Transactions on Cryptographic Hardware and Embedded Systems, Numero Vol. 2020, n°1, 2020, Pagina/e 348-375
Editore:
IACR Cryptology eprint Archive
Autori:
Carolyn Whitnall, Elisabeth Oswald
Pubblicato in:
Proceedings of ASIACRYPT 2019, 2019
Editore:
IACR Cryptology ePrint Archive
Autori:
Si Gao, Ben Marshall, Dan Page and Elisabeth Oswald
Pubblicato in:
IACR Transactions on Cryptographic Hardware and Embedded Systems, Numero 2020, 2020, Pagina/e 152-174
Editore:
IACR Cryptology ePrint Archive
Autori:
Liran Lerman, Nikita Veshchikov, Olivier Markowitch, Francois-Xavier Standaert
Pubblicato in:
IEEE Transactions on Computers, Numero 67/2, 2018, Pagina/e 268-283, ISSN 0018-9340
Editore:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/tc.2017.2731342
Autori:
Olivier Bronchain, Tobias Schneider, François-Xavier Standaert
Pubblicato in:
IACR Transactions on Cryptographic Hardware and Embedded Systems, Numero 2019, N°2, 2019, Pagina/e 318-345, ISSN 2569-2925
Editore:
IACR
DOI:
10.13154/tches.v2019.i2.318-345
Autori:
Weijia Wang, Yu Yu, Francois-Xavier Standaert
Pubblicato in:
IEEE Transactions on Information Forensics and Security, Numero 14/11, 2019, Pagina/e 3069-3082, ISSN 1556-6013
Editore:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/tifs.2019.2912549
Autori:
Itamar Levi, Davide Bellizia, François-Xavier Standaert
Pubblicato in:
IACR Transactions on Cryptographic Hardware and Embedded Systems, Numero Vol. 2019, N°2, 2019, Pagina/e 293-317, ISSN 2569-2925
Editore:
IACR
DOI:
10.13154/tches.v2019.i2.293-317
Autori:
Weijia Wang, Yu Yu, Francois-Xavier Standaert, Junrong Liu, Zheng Guo, Dawu Gu
Pubblicato in:
IEEE Transactions on Information Forensics and Security, Numero 13/5, 2018, Pagina/e 1301-1316, ISSN 1556-6013
Editore:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/tifs.2017.2787985
Autori:
Itamar Levi, Davide Bellizia, François‐Xavier Standaert
Pubblicato in:
International Journal of Circuit Theory and Applications, Numero 48/5, 2020, Pagina/e 674-695, ISSN 0098-9886
Editore:
John Wiley & Sons Inc.
DOI:
10.1002/cta.2756
Autori:
Olivier Bronchain, François-Xavier Standaert
Pubblicato in:
IACR Transactions on Cryptographic Hardware and Embedded Systems, Numero 2020, N°2, 2020, Pagina/e 1-25, ISSN 2569-2925
Editore:
IACR
DOI:
10.13154/tches.v2020.i2.1-25
Autori:
Si Gao, Ben Marshall, Dan Page, Thinh Pham
Pubblicato in:
IACR Transactions on Cryptographic Hardware and Embedded Systems, Numero 2020, N°2, 2020, Pagina/e 73-98, ISSN 2569-2925
Editore:
IACR
DOI:
10.13154/tches.v2020.i2.73-98
Autori:
Ryad BENADJILA
Eleonora CAGLI
Cécile DUMAS
Emmanuel PROUFF
Rémi STRULLU
Pubblicato in:
2018
Editore:
ANSSI
Autori:
Emmanuel Prouff
Remi Strullu
Ryad Benadjila
Eleonora Cagli
Cecile Dumas
Pubblicato in:
2018
Editore:
IACR eprint
Autori:
Ryad Benadjila
Victor Lomné
Emmanuel Prouff
Thomas Roche
Pubblicato in:
2018
Editore:
ANSSI
Autori:
David McCann, Elisabeth Oswald, Carolyn Whitnall
Pubblicato in:
ARM Research Summit 2017, 2017
Editore:
ARM
Autori:
Emmanuel Prouff
Pubblicato in:
Second Theory of Implementation Security (TIs) Workshop, 2018
Editore:
KULeuven
Autori:
Emmanuel Prouff
Pubblicato in:
Workshop on Practical Hardware Innovation in Security and Characterization (PHISIC 2018), 2018
Editore:
--
Autori:
Si Gao
Pubblicato in:
ARM Research Summit 2018, 2018
Editore:
ARM
Autori:
Guilherme Perin, Baris Ege, Jasper van Woudenberg
Pubblicato in:
2018
Editore:
RISCURE
Autori:
Guilherme Perin, Lukasz Chmielewski, Stjepan Picek
Pubblicato in:
IACR Cryptology ePrint Archive, Numero 2019/978, 2019
Editore:
IACR
Autori:
Guilherme Perin, Ileana Buhan, Stjepan Picek
Pubblicato in:
IACR Cryptology ePrint Archive, 2020
Editore:
IACR
Autori:
François-Xavier Standaert
Pubblicato in:
Smart Card Research and Advanced Applications - 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected Papers, Numero 11389, 2019, Pagina/e 65-79, ISBN 978-3-030-15461-5
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-15462-2_5
Autori:
Olivier Bronchain, Julien M. Hendrickx, Clément Massart, Alex Olshevsky, François-Xavier Standaert
Pubblicato in:
Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part I, Numero 11692, 2019, Pagina/e 713-737, ISBN 978-3-030-26947-0
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-26948-7_25
Autori:
Melissa Azouaoui, Romain Poussier, François-Xavier Standaert
Pubblicato in:
Constructive Side-Channel Analysis and Secure Design - 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3–5, 2019, Proceedings, Numero 11421, 2019, Pagina/e 25-42, ISBN 978-3-030-16349-5
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-16350-1_3
Autori:
Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud
Pubblicato in:
Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part III, Numero 10403, 2017, Pagina/e 397-426, ISBN 978-3-319-63696-2
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-63697-9_14
Autori:
Sébastien Duval, Gaëtan Leurent
Pubblicato in:
Smart Card Research and Advanced Applications - 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11–13, 2019, Revised Selected Papers, Numero 11833, 2020, Pagina/e 195-215, ISBN 978-3-030-42067-3
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-42068-0_12
Autori:
Guilherme Perin, Baris Ege, Lukasz Chmielewski
Pubblicato in:
Neural Network Model Assessment for Side-Channel Analysis, 2020, Pagina/e 1-21
Editore:
IACR Cryptology ePrint Archive
È in corso la ricerca di dati su OpenAIRE...
Si è verificato un errore durante la ricerca dei dati su OpenAIRE
Nessun risultato disponibile