attacker is not able to derive directly from a single
measurement of the side channel the actual interme-
diate value being computed. Providing a description
of the leakage function, both formally analyzable and
modeling the actual experimental evidence, is still a
subject for open debate (Galea et al., 2014). More-
over, an interesting research direction is to provide
tighter lower bounds for the attacker effort, once such
a leakage function has been specified.
REFERENCES
Agosta, G., Barenghi, A., Maggi, M., and Pelosi, G.
(2013a). Compiler-based Side Channel Vulnerabil-
ity Analysis and Optimized Countermeasures Appli-
cation. In DAC, page 81. ACM.
Agosta, G., Barenghi, A., and Pelosi, G. (2012). A Code
Morphing Methodology to Automate Power Analysis
Countermeasures. In Groeneveld, P., Sciuto, D., and
Hassoun, S., editors, DAC, pages 77–82. ACM.
Agosta, G., Barenghi, A., Pelosi, G., and Scandale, M.
(2013b). Enhancing Passive Side-Channel Attack
Resilience through Schedulability Analysis of Data-
Dependency Graphs. In Lopez, J., Huang, X., and
Sandhu, R., editors, NSS, volume 7873 of Lecture
Notes in Computer Science, pages 692–698. Springer.
Agosta, G., Barenghi, A., Pelosi, G., and Scandale, M.
(2014). A Multiple Equivalent Execution Trace Ap-
proach to Secure Cryptographic Embedded Software.
In DAC, pages 1–6. ACM.
Barenghi, A., Pelosi, G., and Terraneo, F. (2013). Secure
and Efficient Design of Software Block Cipher Imple-
mentations on Microcontrollers. IJGUC, 4(2/3):110–
118.
Coron, J.-S. (2014). Higher order masking of look-up ta-
bles. In Nguyen, P. Q. and Oswald, E., editors, EU-
ROCRYPT, volume 8441 of LNCS, pages 441–458.
Springer.
Coron, J.-S. and Kizhvatov, I. (2010). Analysis and Im-
provement of the Random Delay Countermeasure of
CHES 2009. In Cryptographic Hardware and Em-
bedded Systems, pages 95–109.
Coron, J.-S., Prouff, E., and Rivain, M. (2007). Side Chan-
nel Cryptanalysis of a Higher Order Masking Scheme.
In Paillier, P. and Verbauwhede, I., editors, CHES, vol-
ume 4727 of LNCS, pages 28–44. Springer.
Debraize, B. (2012). Efficient and provably secure methods
for switching from arithmetic to boolean masking. In
Prouff, E. and Schaumont, P., editors, CHES, volume
7428 of LNCS, pages 107–121. Springer.
Galea, J. L., Martin, D., Oswald, E., Page, D., and Stam,
M. (2014). Making and breaking leakage simula-
tors. Cryptology ePrint Archive, Report 2014/357.
http://eprint.iacr.org/.
Garcia, F. D., van Rossum, P., Verdult, R., and Schreur,
R. W. (2009). Wirelessly Pickpocketing a Mifare
Classic Card. In IEEE Symposium on Security and
Privacy, pages 3–15. IEEE CS.
Ishai, Y., Sahai, A., and Wagner, D. (2003). Private Cir-
cuits: Securing Hardware against Probing Attacks. In
Boneh, D., editor, CRYPTO, volume 2729 of LNCS,
pages 463–481. Springer.
Mangard, S., Oswald, E., and Popp, T. (2007). Power Anal-
ysis Attacks - Revealing the Secrets of Smart Cards.
Springer.
Moradi, A., Barenghi, A., Kasper, T., and Paar, C. (2011).
On the Vulnerability of FPGA Bitstream Encryp-
tion against Power Analysis Attacks: Extracting Keys
from Xilinx Virtex-II FPGAs. In Chen, Y., Danezis,
G., and Shmatikov, V., editors, ACM CCS, pages 111–
124. ACM.
O’Flynn, C. and Chen, Z. (2012). A Case Study of Side-
Channel Analysis Using Decoupling Capacitor Power
Measurement with the OpenADC. In Garc
´
ıa-Alfaro
et al., J., editor, FPS, volume 7743 of LNCS, pages
341–356. Springer.
Prouff, E. and Rivain, M. (2013). Masking against Side-
Channel Attacks: A Formal Security Proof. In Jo-
hansson, T. and Nguyen, P. Q., editors, EUROCRYPT,
volume 7881 of LNCS, pages 142–159. Springer.
Rivain, M. and Prouff, E. (2010). Provably Secure Higher-
Order Masking of AES. In Cryptographic Hardware
and Embedded Systems, CHES, pages 413–427.
Schramm, K. and Paar, C. (2006). Higher Order Masking of
the AES. In Pointcheval, D., editor, CT-RSA, volume
3860 of LNCS, pages 208–225. Springer.
Tillich, S. and Herbst, C. (2008). Attacking State-of-the-Art
Software Countermeasures-A Case Study for AES. In
Oswald, E. and Rohatgi, P., editors, CHES, volume
5154 of LNCS, pages 228–243. Springer.
Whitnall, C., Oswald, E., and Standaert, F.-X. (2014). The
Myth of Generic DPA...and the Magic of Learning. In
Benaloh, J., editor, CT-RSA, volume 8366 of LNCS,
pages 183–205. Springer.
OntheSecurityofPartiallyMaskedSoftwareImplementations
499