Can code polymorphism limit information leakage? - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu
Communication Dans Un Congrès Année : 2011

Can code polymorphism limit information leakage?

Résumé

In addition to its usual complexity assumptions, cryptography silently assumes that information can be physically protected in a single location. As one can easily imagine, real-life devices are not ideal and information may leak through different physical side-channels. It is a known fact that information leakage is a function of both the executed code F and its input x. In this work we explore the use of polymorphic code as a way of resisting side channel attacks. We present experimental results with procedural and functional languages. In each case we rewrite the protected code code Fi before its execution. The outcome is a genealogy of programs F0, F1, . . . such that for all inputs x and for all indexes i ≠ j ⇒ Fi(x) = Fj(x) and Fi ne; Fj . This is shown to increase resistance to side channel attacks.
Fichier principal
Vignette du fichier
978-3-642-21040-2_1_Chapter.pdf (2.17 Mo) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01110259 , version 1 (27-01-2015)

Licence

Paternité

Identifiants

Citer

Antoine Amarilli, Sascha Müller, David Naccache, Daniel Page, Pablo Rauzy, et al.. Can code polymorphism limit information leakage?. 5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩. ⟨hal-01110259⟩
148 Consultations
79 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More