On the automatic construction of indistinguishable operations

  • Authors:
  • M. Barbosa;D. Page

  • Affiliations:
  • Departamento de Informática, Universidade do Minho, Braga, Portugal;Department of Computer Science, University of Bristol, Bristol, United Kingdom

  • Venue:
  • IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel attack. One well studied methodology for defending against such attacks is the concept of indistinguishable functions which leak no information about program control flow since all execution paths are computationally identical. However, constructing such functions by hand becomes laborious and error prone as their complexity increases. We investigate techniques for automating this process and find that effective solutions can be constructed with only minor amounts of computational effort.