1. Structured Leakage and Applications to Cryptographic Constant-Time and Cost
- Author
-
Swarn Priya, Benjamin Grégoire, Gilles Barthe, Vincent Laporte, Institute IMDEA Software [Madrid], Max Planck Institute for Security and Privacy [Bochum] (MPI Security and Privacy), Sûreté du logiciel et Preuves Mathématiques Formalisées (STAMP), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Proof techniques for security protocols (PESTO), Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), and Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Semantics (computer science) ,Computer science ,Cryptography ,02 engineering and technology ,computer.software_genre ,Operational semantics ,Security and privacy ,law.invention ,Formal methods and theory of security ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,03 medical and health sciences ,Constant (computer programming) ,law ,0202 electrical engineering, electronic engineering, information engineering ,Transformer ,ComputingMilieux_MISCELLANEOUS ,030304 developmental biology ,Leakage (electronics) ,0303 health sciences ,Sequence ,[INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL] ,business.industry ,020207 software engineering ,Computer engineering ,Logic and verification ,Compiler ,business ,computer - Abstract
International audience; Many security properties of interest are captured by instrumented semantics that model the functional behavior and the leakage of programs. For several important properties, including cryptographic constant-time (CCT), leakage models are sufficiently abstract that one can define instrumented semantics for high-level and low-level programs. One important goal is then to relate leakage of source programs and leakage of their compilation---this can be used, e.g., to prove preservation of CCT. To simplify this task, we put forward the idea of structured leakage. In contrast to the usual modeling of leakage as a sequence of observations, structured leakage is tightly coupled with the operational semantics of programs. This coupling greatly simplifies the definition of leakage transformers that map the leakage of source programs to leakage of their compilation and yields more precise statements about the preservation of security properties. We illustrate our methods on the Jasmin compiler and prove preservation results for two policies of interest: CCT and cost.
- Published
- 2021
- Full Text
- View/download PDF