ResearchSpace

Investigating multi-thread utilization as a software defence mechanism against side channel attacks

Show simple item record

dc.contributor.author Frieslaar, Ibraheem
dc.contributor.author Irwin, B
dc.date.accessioned 2017-07-28T09:00:23Z
dc.date.available 2017-07-28T09:00:23Z
dc.date.issued 2016-11
dc.identifier.citation Frieslaar, I. and Irwin, B. 2016. Investigating multi-thread utilization as a software defence mechanism against side channel attacks. Proceedings of the 8th International Conference on Signal Processing Systems, 21-24 November 2016, AUT University, Auckland, New Zealand, p. 188-192. doi: 10.1145/3015166.3015176 en_US
dc.identifier.isbn 978-1-4503-4790-7
dc.identifier.uri http://dl.acm.org/citation.cfm?id=3015166.3015176
dc.identifier.uri doi:10.1145/3015166.3015176
dc.identifier.uri http://hdl.handle.net/10204/9322
dc.description Copyright: 2016 The authors. Eighth International Conference on Signal Processing Systems, 21-24 November 2016, AUT University, Auckland, New Zealand en_US
dc.description.abstract A state-of-the-art software countermeasure to defend against side channel attacks is investigated in this work. The implementation of this novel approach consists of using multithreads and a task scheduler on a microcontroller to purposefully leak out information at critical points in the cryptographic algorithm and confuse the attacker. This research demonstrates it is capable of outperforming the known countermeasure of hiding and shuffling in terms of preventing the secret information from being leaked out. Furthermore, the proposed countermeasure mitigates the side channel attacks, such as correlation power analysis and template attacks. en_US
dc.language.iso en en_US
dc.publisher ACM Digital Library en_US
dc.relation.ispartofseries Worklist;18204
dc.subject Software countermeasure en_US
dc.subject Side channel attacks en_US
dc.subject Multi-threading en_US
dc.subject Electromagnetic en_US
dc.title Investigating multi-thread utilization as a software defence mechanism against side channel attacks en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Frieslaar, I., & Irwin, B. (2016). Investigating multi-thread utilization as a software defence mechanism against side channel attacks. ACM Digital Library. http://hdl.handle.net/10204/9322 en_ZA
dc.identifier.chicagocitation Frieslaar, Ibraheem, and B Irwin. "Investigating multi-thread utilization as a software defence mechanism against side channel attacks." (2016): http://hdl.handle.net/10204/9322 en_ZA
dc.identifier.vancouvercitation Frieslaar I, Irwin B, Investigating multi-thread utilization as a software defence mechanism against side channel attacks; ACM Digital Library; 2016. http://hdl.handle.net/10204/9322 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Frieslaar, Ibraheem AU - Irwin, B AB - A state-of-the-art software countermeasure to defend against side channel attacks is investigated in this work. The implementation of this novel approach consists of using multithreads and a task scheduler on a microcontroller to purposefully leak out information at critical points in the cryptographic algorithm and confuse the attacker. This research demonstrates it is capable of outperforming the known countermeasure of hiding and shuffling in terms of preventing the secret information from being leaked out. Furthermore, the proposed countermeasure mitigates the side channel attacks, such as correlation power analysis and template attacks. DA - 2016-11 DB - ResearchSpace DP - CSIR KW - Software countermeasure KW - Side channel attacks KW - Multi-threading KW - Electromagnetic LK - https://researchspace.csir.co.za PY - 2016 SM - 978-1-4503-4790-7 T1 - Investigating multi-thread utilization as a software defence mechanism against side channel attacks TI - Investigating multi-thread utilization as a software defence mechanism against side channel attacks UR - http://hdl.handle.net/10204/9322 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record