Software

Specification and Verification of Side Channel Declassification

Free registration required

Executive Summary

Side channel attacks have emerged as a serious threat to the security of both networked and embedded systems - in particular through the implementations of cryptographic operations. Side channels can be difficult to model formally, but with careful coding and program transformation techniques it may be possible to verify security in the presence of specific side-channel attacks. But what if a program intentionally makes a tradeoff between security and efficiency and leaks some information through a side channel? In this paper the authors study such tradeoffs using ideas from recent research on declassification.

  • Format: PDF
  • Size: 197.5 KB