Skip to Main content Skip to Navigation
Theses

Compilation pour l'application de contre-mesures contre les attaques par canal auxiliaire

Abstract : Embedded systems and connected objects are increasingly used nowadays. Unlike some other systems accessible only through the network, embedded systems are physically accessible by an attacker. The latter can then exploit this physical proximity to mount side-channel attacks to compromise these systems or their data. These non-intrusive attacks have shown great effectiveness in recovering cryptographic keys used in such systems. Embedded systems must therefore be secured against this severe threat. Software countermeasures are most often applied manually by experts. In this thesis, we propose to automatically apply these countermeasures within the compilation process. We propose two approaches, one to apply a first-order Boolean masking countermeasure, the other to apply a code polymorphism countermeasure. We address several problems related to dynamic code generation to enable the use of code polymorphism on constrained systems. Finally, we adapt the chosen countermeasures to obtain a better trade-off between performance and security.
Keywords : Compilation
Document type :
Theses
Complete list of metadatas

https://hal-cea.archives-ouvertes.fr/tel-02431740
Contributor : Abes Star :  Contact
Submitted on : Thursday, October 1, 2020 - 5:16:08 PM
Last modification on : Wednesday, October 14, 2020 - 4:13:22 AM

File

BELLEVILLE_2019_archivage.pdf
Version validated by the jury (STAR)

Identifiers

  • HAL Id : tel-02431740, version 2

Collections

Citation

Nicolas Belleville. Compilation pour l'application de contre-mesures contre les attaques par canal auxiliaire. Cryptographie et sécurité [cs.CR]. Université Grenoble Alpes, 2019. Français. ⟨NNT : 2019GREAM080⟩. ⟨tel-02431740v2⟩

Share

Metrics

Record views

55

Files downloads

17