Practical evaluation of masking software countermeasures on an IoT processor

David McCann, Elisabeth Oswald

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Implementing cryptography on Internet-of-Things (IoT) devices, that is resilient against side channel analysis, has so far been a task only suitable for specialist software designers in interaction with access to a sophisticated testing facility. Recently a novel tool has been developed, ELMO, which offers the potential to enable non-specialist software developers to evaluate their code w.r.t. power analysis for a popular IoT processor. We explain a crucial extension of ELMO, which enables a user to test higher-order masking schemes much more efficiently than so far possible as well as improve the ease and speed of diagnosing masking errors.

Original languageEnglish
Title of host publication2017 2nd International Verification and Security Workshop, IVSW 2017
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages1-6
Number of pages6
ISBN (Electronic)9781538617083
DOIs
Publication statusPublished - 11 Sept 2017
Event2017 2nd International Verification and Security Workshop, IVSW 2017 - Thessaloniki, Greece
Duration: 3 Jul 20175 Jul 2017

Publication series

Name2017 2nd International Verification and Security Workshop, IVSW 2017

Conference

Conference2017 2nd International Verification and Security Workshop, IVSW 2017
Country/TerritoryGreece
CityThessaloniki
Period3/07/175/07/17

Bibliographical note

Funding Information:
This work has been supported in part by EPSRC via grant EP/N011635/1.

Publisher Copyright:
© 2017 IEEE.

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Practical evaluation of masking software countermeasures on an IoT processor'. Together they form a unique fingerprint.

Cite this