Locked History Actions

Diff for "Related Publications"

Differences between revisions 3 and 8 (spanning 5 versions)
Revision 3 as of 2016-05-30 14:13:32
Size: 1816
Editor: paravengers
Comment:
Revision 8 as of 2017-02-03 09:52:19
Size: 2024
Editor: dhcp26-200
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
= Implementations of Masking = #acl UserGroup:read,write,revert All:read

= Implementations of automated Masking =
Line 8: Line 10:
 * LLVM obfuscator
 *
 * Obfuscator-LLVM:
  * Bogus Control Flow (https://github.com/obfuscator-llvm/obfuscator/wiki/Bogus-Control-Flow) Average overhead performance ➡ 28 %
  * Control Flow Flattening (https://github.com/obfuscator-llvm/obfuscator/wiki/Control-Flow-Flattening) Average overhead performance ➡ 860 %
  * Instruction Substitution (https://github.com/obfuscator-llvm/obfuscator/wiki/Instructions-Substitution) Average overhead performance ➡ 13.5 %
  * A commercial version of this project with more features is available at https://strong.codes/
Line 14: Line 20:
  * attack on the branch predictor.<<BR>>(in French, has links) https://interstices.info/jcms/c_25753/une-faille-de-securite-dans-les-processeurs
  * attack on the Dcache (need ref)
Line 21: Line 29:
  * Obfuscator-LLVM:
   * Bogus Control Flow (https://github.com/obfuscator-llvm/obfuscator/wiki/Bogus-Control-Flow)Average overhead performance ➡ 28 %
   * Control Flow Flattening (https://github.com/obfuscator-llvm/obfuscator/wiki/Control-Flow-Flattening)Average overhead performance ➡ 860 %
   * Instruction Substitution (https://github.com/obfuscator-llvm/obfuscator/wiki/Instructions-Substitution)Average overhead performance ➡ 13.5 %
   * A commercial version of this project with more features is available at :<<BR>>https://strong.codes/

Implementations of automated Masking

  • Andrew Moss, Elisabeth Oswald, Dan Page, and Michael Tunstall. Compiler Assisted Masking. In Emmanuel Prouff and Patrick Schaumont, editors, CHES, volume 7428 of LNCS, pages 58–75. Springer, 2012

  • G. Agosta, A. Barenghi, M. Maggi and G. Pelosi, "Compiler-based side channel vulnerability analysis and optimized countermeasures application" Design Automation Conference (DAC), 2013 50th ACM/EDAC/IEEE, Austin, TX, 2013, p. 1-6.

Obfuscation

Model of attacker

In the case of cyber attacks