Publication | Closed Access
“Re-synchronization by moments”: An efficient solution to align Side-Channel traces
12
Citations
3
References
2011
Year
Unknown Venue
EngineeringInformation SecurityComputer ArchitectureInnovative Re-synchronization AlgorithmEmbedded SystemsSide-channel AttackClock SynchronizationSoftware AnalysisFormal VerificationHardware SecurityCryptographic Co-processorSca TracesSynchronization ProtocolTrusted Execution EnvironmentHardware Security SolutionCryptanalytic AttackEfficient SolutionComputer EngineeringLightweight CryptographyComputer ScienceSignal ProcessingData SecurityCryptographySide-channel Analysis
Modern embedded systems rely on cryptographic co-processor to ensure security. These cryptographic co-processor are theoretically secure but their physical implementations are vulnerable against Side-Channel Analysis (SCA). Therefore, embedded systems should be evaluated for their robustness against these attacks. In SCA, the preprocessing of acquired traces is crucial to mount an efficient analysis and therefore make a reliable evaluation. This paper mainly deals with the common problem of aligning SCA traces. For this purpose, we put forward an innovative re-synchronization algorithm and show its efficiency compared to existing techniques. Our results are based on real measurements acquired from several cryptographic implementations.
| Year | Citations | |
|---|---|---|
Page 1
Page 1