期刊论文详细信息
Sensors
Compiler Optimizations as a Countermeasure against Side-Channel Analysis in MSP430-Based Devices
Pedro Malagón1  Juan-Mariano de Goyeneche2  Marina Zapater2  José M. Moya2 
[1] Escuela Técnica Superior de Ingenieros de Telecomunicación, Universidad Politécnica de Madrid, 28040 Madrid, Spain;
关键词: embedded system security;    side-channel attacks;    hiding countermeasure;    compiler optimization;    MSP430;   
DOI  :  10.3390/s120607994
来源: mdpi
PDF
【 摘 要 】

Ambient Intelligence (AmI) requires devices everywhere, dynamic and massively distributed networks of low-cost nodes that, among other data, manage private information or control restricted operations. MSP430, a 16-bit microcontroller, is used in WSN platforms, as the TelosB. Physical access to devices cannot be restricted, so attackers consider them a target of their malicious attacks in order to obtain access to the network. Side-channel analysis (SCA) easily exploits leakages from the execution of encryption algorithms that are dependent on critical data to guess the key value. In this paper we present an evaluation framework that facilitates the analysis of the effects of compiler and backend optimizations on the resistance against statistical SCA. We propose an optimization-based software countermeasure that can be used in current low-cost devices to radically increase resistance against statistical SCA, analyzed with the new framework.

【 授权许可】

CC BY   
© 2012 by the authors; licensee MDPI, Basel, Switzerland.

【 预 览 】
附件列表
Files Size Format View
RO202003190043567ZK.pdf 2125KB PDF download
  文献评价指标  
  下载次数:14次 浏览次数:17次