Skip to Main content Skip to Navigation
Poster communications

Runtime Code Polymorphism as a Protection against Physical Attacks

Abstract : We present a generic framework for runtime code polymorphism, applicable to a large class of computing platforms up to embedded systems with low computing resources (e.g. microcontrollers with few kilo-bytes of memory). Code polymorphism is de ned as the ability to change the observable behaviour of a software component without changing its functional properties. In our framework, code polymorphism is achieved thanks to runtime code generation, which o ers many levers for code transformations: we describe the use of random register allocation, random instruction selection, instruction shuing and insertion of noise instructions.We evaluate the e ectiveness of our framework against di erential power analysis and its overhead impact. As compared to a reference implementation of AES where the cipher key could be recovered by DPA in less than 50 traces in average, in our implementation the key cipher could not be extracted after 10000 traces. Our experimental evaluation shows a moderate impact in terms of performance overhead.
Complete list of metadatas

Cited literature [1 references]  Display  Hide  Download

https://hal-emse.ccsd.cnrs.fr/emse-01232662
Contributor : Bruno Robisson <>
Submitted on : Monday, November 23, 2015 - 9:16:44 PM
Last modification on : Wednesday, June 24, 2020 - 4:19:09 PM
Long-term archiving on: : Friday, April 28, 2017 - 7:22:25 PM

File

Courousse2015-CHES-poster.pdf
Files produced by the author(s)

Identifiers

  • HAL Id : emse-01232662, version 1

Citation

Damien Couroussé, Bruno Robisson, Thierno Barry, P Jaillon, Olivier Potin. Runtime Code Polymorphism as a Protection against Physical Attacks. Workshop on Cryptographic Hardware and Embedded Systems, Sep 2015, Saint-Malo, France. ⟨emse-01232662⟩

Share

Metrics

Record views

2491

Files downloads

330