The Side-channel Metrics Cheat Sheet

نویسندگان

چکیده

Side-channel attacks exploit a physical observable originating from cryptographic device in order to extract its secrets. Many practically relevant advances the field of side-channel analysis relate security evaluations functions and devices. Accordingly, many metrics have been adopted or defined express quantify security. These can one another, but also conflict terms effectiveness, assumptions, goals. In this work, we review most commonly used analysis. We provide self-contained presentation each metric, along with discussion limitations. demonstrate on examples implementations Advanced Encryption Standard (AES), make software implementation presented available community as open source. This being beyond survey current status metrics, will allow researchers practitioners produce well-informed evaluation through better understanding supporting summarizing metrics.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ranks “cheat Sheet”

This is a “cheat sheet”, which means that it consists of information packaged in a concise and efficient way so that it can easily be used as a quick reference. The topic is ranks of elliptic curves, mostly over Q. This is a slightly revised version of the handout I wrote as a supplement to my survey talk “Distributions of Ranks of Elliptic Curves” at MSRI’s Connections for Women: Arithmetic St...

متن کامل

Side-Channel Vulnerability Metrics: SVF vs. CSV

Recently two papers have been published on empirically measuring side-channel leakage in processors. The first paper introduced a framework for measuring side-channel leakage called “Side-Channel Vulnerability Factor” (SVF). SVF used phase correlation between victim and attacker programs to quantify leakage. A subsequent paper opposed some of the claims made in the SVF paper and introduced anot...

متن کامل

Privacy Guidelines for Internet of Things: A Cheat Sheet

This document presents 30 different privacy guidelines that can be used to both design and assess IoT applications and IoT middleware platforms. These guidelines can be broadly categorised into eight categories, namely, MINIMIZE ( ), HIDE ( ), SEPARATE ( ), AGGREGATE ( ), INFORM ( ), CONTROL ( ), ENFORCE ( ), DEMONSTRATE ( ). This document uses the following structure to introduce the each priv...

متن کامل

Improved Channel Estimation for DVB-T2 Systems by Utilizing Side Information on OFDM Sparse Channel Estimation

The second generation of digital video broadcasting (DVB-T2) standard utilizes orthogonal frequency division multiplexing (OFDM) system to reduce and to compensate the channel effects by utilizing its estimation. Since wireless channels are inherently sparse, it is possible to utilize sparse representation (SR) methods to estimate the channel. In addition to sparsity feature of the channel, the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Computing Surveys

سال: 2023

ISSN: ['0360-0300', '1557-7341']

DOI: https://doi.org/10.1145/3565571