A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Custom Instruction Support for Modular Defense against Side-channel and Fault Attacks
[article]
2020
IACR Cryptology ePrint Archive
The design of software countermeasures against active and passive adversaries is a challenging problem that has been addressed by many authors in recent years. The proposed solutions adopt a theoretical foundation (such as a leakage model) but often do not offer concrete reference implementations to validate the foundation. Contributing to the experimental dimension of this body of work, we propose a customized processor called SKIVA that supports experiments with the design of countermeasures
dblp:journals/iacr/KiaeiMDHS20
fatcat:ju5lmfibhjchjlfu3ydhgowaoq