Mostra el registre d'ítem simple
On the use of error detecting and correcting codes to boost security in caches against side channel attacks
dc.contributor.author | Neagu, Madalin |
dc.contributor.author | Miclea, Liviu |
dc.contributor.author | Manich Bou, Salvador |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament d'Enginyeria Electrònica |
dc.date.accessioned | 2015-03-19T10:48:23Z |
dc.date.available | 2015-03-19T10:48:23Z |
dc.date.created | 2015 |
dc.date.issued | 2015 |
dc.identifier.citation | Neagu, M.; Miclea, L.; Manich, S. On the use of error detecting and correcting codes to boost security in caches against side channel attacks. A: Workshop on Trustworthy Manufacturing and Utilization of Secure Devices. "Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition: 9-13 March 2015, Grenoble, France". Grenoble: 2015, p. 1-6. |
dc.identifier.isbn | 978-3-9815370-4-8 |
dc.identifier.uri | http://hdl.handle.net/2117/26828 |
dc.description.abstract | Microprocessor memory is sensitive to cold boot attacks. In this kind of attacks, memory remanence is exploited to download its content after the microprocessor has been struck by a hard boot. If just in this moment, a crypto-algorithm was in execution, the memory data can be downloaded into a backup memory and specialized tools can be used to extract the secret keys. In the main memory data can be protected using efficient encryption techniques but in caches this is not possible unless the performance becomes seriously degraded. Recently, an interleaved scrambling technique (IST) was presented to improve the security of caches against cold boot attacks. While IST is effective for this particular kind of attacks, a weakness exists against side channel attacks, in particular using power analysis. Reliability of data in caches is warranted by means of error detecting and correcting codes. In this work it is shown how these kinds of codes can be used not only to improve reliability but also the security of data. In particular, a self-healing technique is selected to make the IST technique robust against side channel attacks using power analysis. |
dc.format.extent | 6 p. |
dc.language.iso | eng |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica |
dc.subject.lcsh | Digital signatures |
dc.subject.lcsh | Cryptography |
dc.subject.lcsh | Cache memory |
dc.subject.other | data scrambling |
dc.subject.other | cache memories |
dc.subject.other | cold boot attack |
dc.subject.other | self-healing memories |
dc.subject.other | side channel attack |
dc.title | On the use of error detecting and correcting codes to boost security in caches against side channel attacks |
dc.type | Conference report |
dc.subject.lemac | Xifratge (Informàtica) |
dc.subject.lemac | Criptografia |
dc.subject.lemac | Memòria cau |
dc.contributor.group | Universitat Politècnica de Catalunya. QINE - Disseny de Baix Consum, Test, Verificació i Circuits Integrats de Seguretat |
dc.relation.publisherversion | http://www.date-conference.com/conference/workshop-w10 |
dc.rights.access | Open Access |
local.identifier.drac | 15520126 |
dc.description.version | Postprint (author’s final draft) |
local.citation.author | Neagu, M.; Miclea, L.; Manich, S. |
local.citation.contributor | Workshop on Trustworthy Manufacturing and Utilization of Secure Devices |
local.citation.pubplace | Grenoble |
local.citation.publicationName | Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition: 9-13 March 2015, Grenoble, France |
local.citation.startingPage | 1 |
local.citation.endingPage | 6 |