TY - GEN
T1 - Can code polymorphism limit information leakage?
AU - Amarilli, Antoine
AU - Müller, Sascha
AU - Naccache, David
AU - Page, Daniel
AU - Rauzy, Pablo
AU - Tunstall, Michael
PY - 2011/6/20
Y1 - 2011/6/20
N2 - In addition to its usual complexity assumptions, cryptography silently assumes that information can be physically protected in a single location. As one can easily imagine, real-life devices are not ideal and information may leak through different physical side-channels. It is a known fact that information leakage is a function of both the executed code F and its input x. In this work we explore the use of polymorphic code as a way of resisting side channel attacks. We present experimental results with procedural and functional languages. In each case we rewrite the protected code code F i before its execution. The outcome is a genealogy of programs F0,F 1,... such that for all inputs x and for all indexes i ≠ j ⇒ Fi(x) = Fj(x) and Fi ≠ Fj. This is shown to increase resistance to side channel attacks.
AB - In addition to its usual complexity assumptions, cryptography silently assumes that information can be physically protected in a single location. As one can easily imagine, real-life devices are not ideal and information may leak through different physical side-channels. It is a known fact that information leakage is a function of both the executed code F and its input x. In this work we explore the use of polymorphic code as a way of resisting side channel attacks. We present experimental results with procedural and functional languages. In each case we rewrite the protected code code F i before its execution. The outcome is a genealogy of programs F0,F 1,... such that for all inputs x and for all indexes i ≠ j ⇒ Fi(x) = Fj(x) and Fi ≠ Fj. This is shown to increase resistance to side channel attacks.
U2 - 10.1007/978-3-642-21040-2_1
DO - 10.1007/978-3-642-21040-2_1
M3 - Conference contribution
AN - SCOPUS:79958838594
SN - 9783642210396
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 1
EP - 21
BT - Information Security Theory and Practice
T2 - 5th Workshop in Information Security Theory and Practice, WISTP 2011
Y2 - 1 June 2011 through 3 June 2011
ER -