Compositional synthesis of leakage resilient programs

Arthur Blot, Masaki Yamamoto, Tachio Terauchi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

A promising approach to defend against side channel attacks is to build programs that are leakage resilient, in a formal sense. One such formal notion of leakage resilience is the n-threshold-probing model proposed in the seminal work by Ishai et al. [16]. In a recent work [9], Eldib and Wang have proposed a method for automatically synthesizing programs that are leakage resilient according to this model, for the case n = 1. In this paper, we show that the n-threshold-probing model of leakage resilience enjoys a certain compositionality property that can be exploited for synthesis.We use the property to design a synthesis method that efficiently synthesizes leakage-resilient programs in a compositional manner, for the general case of n > 1. We have implemented a prototype of the synthesis algorithm, and we demonstrate its effectiveness by synthesizing leakage-resilient versions of benchmarks taken from the literature.

Original languageEnglish
Title of host publicationPrinciples of Security and Trust - 6th International Conference, POST 2017 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Proceedings
PublisherSpringer Verlag
Pages277-297
Number of pages21
Volume10204 LNCS
ISBN (Print)9783662544549
DOIs
Publication statusPublished - 2017
Externally publishedYes
Event6th Conference on Principles of Security and Trust, POST 2017 held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017 - Uppsala, Sweden
Duration: 2017 Apr 222017 Apr 29

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10204 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other6th Conference on Principles of Security and Trust, POST 2017 held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017
CountrySweden
CityUppsala
Period17/4/2217/4/29

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Compositional synthesis of leakage resilient programs'. Together they form a unique fingerprint.

  • Cite this

    Blot, A., Yamamoto, M., & Terauchi, T. (2017). Compositional synthesis of leakage resilient programs. In Principles of Security and Trust - 6th International Conference, POST 2017 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Proceedings (Vol. 10204 LNCS, pp. 277-297). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10204 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-662-54455-6_13