Can code polymorphism limit information leakage?

  • Antoine Amarilli
  • , Sascha Müller
  • , David Naccache
  • , Daniel Page
  • , Pablo Rauzy
  • , Michael Tunstall

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In addition to its usual complexity assumptions, cryptography silently assumes that information can be physically protected in a single location. As one can easily imagine, real-life devices are not ideal and information may leak through different physical side-channels. It is a known fact that information leakage is a function of both the executed code F and its input x. In this work we explore the use of polymorphic code as a way of resisting side channel attacks. We present experimental results with procedural and functional languages. In each case we rewrite the protected code code F i before its execution. The outcome is a genealogy of programs F0,F 1,... such that for all inputs x and for all indexes i ≠ j ⇒ Fi(x) = Fj(x) and Fi ≠ Fj. This is shown to increase resistance to side channel attacks.

Original languageEnglish
Title of host publicationInformation Security Theory and Practice
Subtitle of host publicationSecurity and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Proceedings
Pages1-21
Number of pages21
DOIs
Publication statusPublished - 20 Jun 2011
Event5th Workshop in Information Security Theory and Practice, WISTP 2011 - Heraklion, Crete, Greece
Duration: 1 Jun 20113 Jun 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6633 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th Workshop in Information Security Theory and Practice, WISTP 2011
Country/TerritoryGreece
CityHeraklion, Crete
Period1/06/113/06/11

Fingerprint

Dive into the research topics of 'Can code polymorphism limit information leakage?'. Together they form a unique fingerprint.

Cite this