Go to:
Logótipo
Você está em: Start > Publications > View > Formal verification of side-channel countermeasures using self-composition
Map of Premises
Principal
Publication

Formal verification of side-channel countermeasures using self-composition

Title
Formal verification of side-channel countermeasures using self-composition
Type
Article in International Scientific Journal
Year
2013
Authors
Bacelar Almeida, JB
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. View Authenticus page Without ORCID
Pinto, JS
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. View Authenticus page Without ORCID
Vieira, B
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Journal
Vol. 78
Pages: 796-812
ISSN: 0167-6423
Publisher: Elsevier
Other information
Authenticus ID: P-004-ZVC
Abstract (EN): Formal verification of cryptographic software implementations poses significant challenges for off-the-shelf tools. This is due to the domain-specific characteristics of the code, involving aggressive optimizations and non-functional security requirements, namely the critical aspect of countermeasures against side-channel attacks. In this paper, we extend previous results supporting the practicality of self-composition proofs of non-interference and generalizations thereof. We tackle the formal verification of high-level security policies adopted in the implementation of the recently proposed NaCl cryptographic library. We formalize these policies and propose a formal verification approach based on self-composition, extending the range of security policies that could previously be handled using this technique. We demonstrate our results by addressing compliance with the NaCl security policies in real-world cryptographic code, highlighting the potential for automation of our techniques.
Language: English
Type (Professor's evaluation): Scientific
No. of pages: 17
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same journal

Typed connector families and their semantics (2017)
Article in International Scientific Journal
Proença, J; Clarke, D
The CAOS framework for Scala: Computer-aided design of SOS (2025)
Article in International Scientific Journal
Proença, J; Edixhoven, L
Ranking programming languages by energy efficiency (2021)
Article in International Scientific Journal
Rui Pereira; Marco Couto; Francisco Ribeiro; Rui Rua; Jácome Cunha; João Paulo Fernandes; João Saraiva
Multiple intermediate structure deforestation by shortcut fusion (2016)
Article in International Scientific Journal
Pardo, A; Joao Paulo Fernandes; Saraiva, J

See all (16)

Recommend this page Top
Copyright 1996-2025 © Faculdade de Medicina Dentária da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-07-19 at 20:02:29 | Privacy Policy | Personal Data Protection Policy | Whistleblowing | Electronic Yellow Book