dc.contributor.author |
Frieslaar, Ibraheem
|
|
dc.contributor.author |
Irwin, B
|
|
dc.date.accessioned |
2017-07-28T09:00:23Z |
|
dc.date.available |
2017-07-28T09:00:23Z |
|
dc.date.issued |
2016-11 |
|
dc.identifier.citation |
Frieslaar, I. and Irwin, B. 2016. Investigating multi-thread utilization as a software defence mechanism against side channel attacks. Proceedings of the 8th International Conference on Signal Processing Systems, 21-24 November 2016, AUT University, Auckland, New Zealand, p. 188-192. doi: 10.1145/3015166.3015176 |
en_US |
dc.identifier.isbn |
978-1-4503-4790-7 |
|
dc.identifier.uri |
http://dl.acm.org/citation.cfm?id=3015166.3015176
|
|
dc.identifier.uri |
doi:10.1145/3015166.3015176
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/9322
|
|
dc.description |
Copyright: 2016 The authors. Eighth International Conference on Signal Processing Systems, 21-24 November 2016, AUT University, Auckland, New Zealand |
en_US |
dc.description.abstract |
A state-of-the-art software countermeasure to defend against side channel attacks is investigated in this work. The implementation of this novel approach consists of using multithreads and a task scheduler on a microcontroller to purposefully leak out information at critical points in the cryptographic algorithm and confuse the attacker. This research demonstrates it is capable of outperforming the known countermeasure of hiding and shuffling in terms of preventing the secret information from being leaked out. Furthermore, the proposed countermeasure mitigates the side channel attacks, such as correlation power analysis and template attacks. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
ACM Digital Library |
en_US |
dc.relation.ispartofseries |
Worklist;18204 |
|
dc.subject |
Software countermeasure |
en_US |
dc.subject |
Side channel attacks |
en_US |
dc.subject |
Multi-threading |
en_US |
dc.subject |
Electromagnetic |
en_US |
dc.title |
Investigating multi-thread utilization as a software defence mechanism against side channel attacks |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Frieslaar, I., & Irwin, B. (2016). Investigating multi-thread utilization as a software defence mechanism against side channel attacks. ACM Digital Library. http://hdl.handle.net/10204/9322 |
en_ZA |
dc.identifier.chicagocitation |
Frieslaar, Ibraheem, and B Irwin. "Investigating multi-thread utilization as a software defence mechanism against side channel attacks." (2016): http://hdl.handle.net/10204/9322 |
en_ZA |
dc.identifier.vancouvercitation |
Frieslaar I, Irwin B, Investigating multi-thread utilization as a software defence mechanism against side channel attacks; ACM Digital Library; 2016. http://hdl.handle.net/10204/9322 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Frieslaar, Ibraheem
AU - Irwin, B
AB - A state-of-the-art software countermeasure to defend against side channel attacks is investigated in this work. The implementation of this novel approach consists of using multithreads and a task scheduler on a microcontroller to purposefully leak out information at critical points in the cryptographic algorithm and confuse the attacker. This research demonstrates it is capable of outperforming the known countermeasure of hiding and shuffling in terms of preventing the secret information from being leaked out. Furthermore, the proposed countermeasure mitigates the side channel attacks, such as correlation power analysis and template attacks.
DA - 2016-11
DB - ResearchSpace
DP - CSIR
KW - Software countermeasure
KW - Side channel attacks
KW - Multi-threading
KW - Electromagnetic
LK - https://researchspace.csir.co.za
PY - 2016
SM - 978-1-4503-4790-7
T1 - Investigating multi-thread utilization as a software defence mechanism against side channel attacks
TI - Investigating multi-thread utilization as a software defence mechanism against side channel attacks
UR - http://hdl.handle.net/10204/9322
ER -
|
en_ZA |