Sensors | |
Compiler Optimizations as a Countermeasure against Side-Channel Analysis in MSP430-Based Devices | |
Pedro Malagón1  Juan-Mariano de Goyeneche2  Marina Zapater2  José M. Moya2  | |
[1] Escuela Técnica Superior de Ingenieros de Telecomunicación, Universidad Politécnica de Madrid, 28040 Madrid, Spain; | |
关键词: embedded system security; side-channel attacks; hiding countermeasure; compiler optimization; MSP430; | |
DOI : 10.3390/s120607994 | |
来源: mdpi | |
【 摘 要 】
Ambient Intelligence (AmI) requires devices everywhere, dynamic and massively distributed networks of low-cost nodes that, among other data, manage private information or control restricted operations. MSP430, a 16-bit microcontroller, is used in WSN platforms, as the TelosB. Physical access to devices cannot be restricted, so attackers consider them a target of their malicious attacks in order to obtain access to the network. Side-channel analysis (SCA) easily exploits leakages from the execution of encryption algorithms that are dependent on critical data to guess the key value. In this paper we present an evaluation framework that facilitates the analysis of the effects of compiler and backend optimizations on the resistance against statistical SCA. We propose an optimization-based software countermeasure that can be used in current low-cost devices to radically increase resistance against statistical SCA, analyzed with the new framework.
【 授权许可】
CC BY
© 2012 by the authors; licensee MDPI, Basel, Switzerland.
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
RO202003190043567ZK.pdf | 2125KB | download |