A code morphing methodology to automate power analysis countermeasures
暂无分享,去创建一个
[1] Evelyn Duesterwald. Dynamic Compilation , 2002, The Compiler Design Handbook.
[2] Alessandro Barenghi,et al. Improving first order differential power attacks through digital signal processing , 2010, SIN.
[3] Paolo Ienne,et al. A first step towards automatic application of power analysis countermeasures , 2011, 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC).
[4] Emmanuel Prouff,et al. Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers , 2009, CHES.
[5] Jean-Sébastien Coron,et al. Analysis and Improvement of the Random Delay Countermeasure of CHES 2009 , 2010, CHES.
[6] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[7] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[8] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[9] Stefan Tillich,et al. Attacking State-of-the-Art Software Countermeasures-A Case Study for AES , 2008, CHES.
[10] Alessandro Barenghi,et al. Information Leakage Discovery Techniques to Enhance Secure Chip Design , 2011, WISTP.