{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:04:37Z","timestamp":1743026677552,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030105907"},{"type":"electronic","value":"9783030105914"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T00:00:00Z","timestamp":1610668800000},"content-version":"vor","delay-in-days":14,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Side Channel Attacks are nowadays considered a serious risk for many security products and ubiquitous devices. Strong security solution providers need to evaluate their implementations against such attacks before publishing them on the market, thus performing a thorough assessment. However, this procedure is not straightforward and even with the appropriate equipment, it may require considerable time to provide results due to the slow process of collecting measurements (traces) and the inflexible way of controlling the tested implementation. In this chapter, we explore and overview the trace collection landscape for generic devices under test (including ubiquitous systems) highlighting and overviewing the latest trace collection toolsets and their shortcomings, but also proposing a trace collection approach that can be applied on the most recent, open source toolsets. We showcase our proposed approach on the FlexLeco project architecture, which we have developed in our lab, and manage to practically describe how an evaluator using the proposed methodology can collect traces easily and quickly without the need to completely redesign a control mechanism for the implementation under test.<\/jats:p>","DOI":"10.1007\/978-3-030-10591-4_9","type":"book-chapter","created":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T14:06:41Z","timestamp":1610633201000},"page":"147-163","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Side Channel Assessment Platforms and Tools for Ubiquitous Systems"],"prefix":"10.1007","author":[{"given":"Apostolos P.","family":"Fournaris","sequence":"first","affiliation":[]},{"given":"Athanassios","family":"Moschos","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Sklavos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,15]]},"reference":[{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Frederic Amiel, Benoit Feix, and Karine Villegas. Power analysis for secret recovering and reverse engineering of public key algorithms. In Carlisle Adams, Ali Miri, and Michael Wiener, editors, Selected Areas in Cryptography, volume 4876 of Lecture Notes in Computer Science, pages 110\u2013125. Springer, 2007.","DOI":"10.1007\/978-3-540-77360-3_8"},{"key":"9_CR58","doi-asserted-by":"crossref","unstructured":"Lejla Batina, \u0141ukasz Chmielewski, Louiza Papachristodoulou, Peter Schwabe, and Michael Tunstall. Online template attacks. In Willi Meier and Debdeep Mukhopadhyay, editors, Progress in Cryptology \u2013 INDOCRYPT 2014, pages 21\u201336, Cham, 2014. Springer International Publishing.","DOI":"10.1007\/978-3-319-13039-2_2"},{"key":"9_CR59","doi-asserted-by":"crossref","unstructured":"Aur\u00e9lie Bauer and \u00c9liane Jaulmes. Correlation analysis against protected sfm implementations of rsa. In Goutam Paul and Serge Vaudenay, editors, Progress in Cryptology - INDOCRYPT 2013, volume 8250 of Lecture Notes in Computer Science, pages 98\u2013115. Springer International Publishing, 2013.","DOI":"10.1007\/978-3-319-03515-4_7"},{"key":"9_CR60","doi-asserted-by":"crossref","unstructured":"Aur\u00e9lie Bauer, \u00c9liane Jaulmes, Emmanuel Prouff, and Justine Wild. Horizontal and vertical side-channel attacks against secure RSA implementations. In Ed Dawson, editor, Topics in Cryptology \u2013 CT-RSA 2013, volume 7779 of Lecture Notes in Computer Science, pages 1\u201317, San Francisco, CA, USA, February 25 \u2013 March 1, 2013. Springer.","DOI":"10.1007\/978-3-642-36095-4_1"},{"key":"9_CR61","doi-asserted-by":"crossref","unstructured":"Aur\u00e9lie Bauer, \u00c9liane Jaulmes, Emmanuel Prouff, and Justine Wild. Horizontal collision correlation attack on elliptic curves. In Tanja Lange, Kristin Lauter, and Petr Lisonek, editors, SAC 2013: 20th Annual International Workshop on Selected Areas in Cryptography, volume 8282 of Lecture Notes in Computer Science, pages 553\u2013570, Burnaby, BC, Canada, August 14\u201316, 2014. Springer.","DOI":"10.1007\/978-3-662-43414-7_28"},{"key":"9_CR67","unstructured":"G C Becker, Jennifer Cooper, E. DeMulder, Gilbert Goodwill, Jules Jaffe, G. Kenworthy, T. Kouzminov, Andrew Leiserson, Mark E. Marson, Pankaj Rohatgi, and Sami Saab. Test vector leakage assessment (tvla) methodology in practice. In International Cryptographic Module Conference, volume 1001, page 13, 2013."},{"key":"9_CR99","doi-asserted-by":"crossref","unstructured":"Andrey Bogdanov, Ilya Kizhvatov, and Andrey Pyshkin. Algebraic methods in side-channel collision attacks and practical collision detection. In DipanwitaRoy Chowdhury, Vincent Rijmen, and Abhijit Das, editors, Progress in Cryptology - INDOCRYPT 2008, volume 5365 of Lecture Notes in Computer Science, pages 251\u2013265. Springer, 2008.","DOI":"10.1007\/978-3-540-89754-5_20"},{"key":"9_CR117","doi-asserted-by":"crossref","unstructured":"Marco Bucci, Luca Giancane, Raimondo Luzzi, M. Marino, Giuseppe Scotti, and Alessandro Trifiletti. Enhancing power analysis attacks against cryptographic devices. IET Circuits, Devices & Systems, 2(3):298\u2013305, 2008.","DOI":"10.1049\/iet-cds:20070166"},{"issue":"6","key":"9_CR197","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1109\/MDT.2007.178","volume":"24","author":"Thomas Eisenbarth","year":"2007","unstructured":"Thomas Eisenbarth, Sandeep S. Kumar, Christof Paar, Axel Poschmann, and Leif Uhsadel. A survey of lightweight-cryptography implementations. IEEE Design & Test of Computers, 24(6):522\u2013533, 2007.","journal-title":"IEEE Design & Test of Computers"},{"key":"9_CR210","doi-asserted-by":"crossref","unstructured":"Benoit Feix, Myl\u00e8ne Roussellet, and Alexandre Venelli. Side-channel analysis on blinded regular scalar multiplications. In Willi Meier and Debdeep Mukhopadhyay, editors, Progress in Cryptology - INDOCRYPT 2014: 15th International Conference in Cryptology in India, volume 8885 of Lecture Notes in Computer Science, pages 3\u201320, New Delhi, India, December 14\u201317, 2014. Springer.","DOI":"10.1007\/978-3-319-13039-2_1"},{"key":"9_CR219","doi-asserted-by":"crossref","unstructured":"A. P. Fournaris, L. Papachristodoulou, and N. Sklavos. Secure and efficient rns software implementation for elliptic curve cryptography. In 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS PW), pages 86\u201393, April 2017.","DOI":"10.1109\/EuroSPW.2017.56"},{"key":"9_CR220","volume-title":"Fault and Power Analysis Attack Protection Techniques for Standardized Public Key Cryptosystems, pages 93\u2013105","author":"Apostolos P Fournaris","year":"2017","unstructured":"Apostolos P. Fournaris. Fault and Power Analysis Attack Protection Techniques for Standardized Public Key Cryptosystems, pages 93\u2013105. Springer International Publishing, Cham, 2017."},{"key":"9_CR229","doi-asserted-by":"crossref","unstructured":"Benedikt Gierlichs, Lejla Batina, Pim Tuyls, and Bart Preneel. Mutual information analysis. In Elisabeth Oswald and Pankaj Rohatgi, editors, Cryptographic Hardware and Embedded Systems \u2013 CHES 2008, pages 426\u2013442. Springer, 2008.","DOI":"10.1007\/978-3-540-85053-3_27"},{"key":"9_CR307","doi-asserted-by":"crossref","unstructured":"Lyndon Judge, Michael Cantrell, Cagil Kendir, and Patrick Schaumont. A modular testing environment for implementation attacks. In 2012 ASE\/IEEE International Conference on BioMedical Computing (BioMedCom), pages 86\u201395, Dec 2012.","DOI":"10.1109\/BioMedCom.2012.21"},{"key":"9_CR335","unstructured":"\u00c7etin Kaya Ko\u00e7. Cryptographic Engineering. Springer Publishing Company, Incorporated, 1st edition, 2008."},{"key":"9_CR336","doi-asserted-by":"crossref","unstructured":"Paul Kocher, Joshua Jaffe, and Benjamin Jun. Differential power analysis. In Advances in Cryptology Proceedings of Crypto 99, pages 388\u2013397. Springer-Verlag, 1999.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"9_CR337","doi-asserted-by":"crossref","unstructured":"Paul Kocher, Ruby Lee, Gary McGraw, and Anand Raghunathan. Security as a new dimension in embedded system design. In Proceedings of the 41st Annual Design Automation Conference, DAC \u201904, pages 753\u2013760, New York, NY, USA, 2004. ACM. Moderator-Ravi, Srivaths.","DOI":"10.1145\/996566.996771"},{"key":"9_CR353","unstructured":"Satoh Labs and Morita Tech. Sasebo\/sakura project. http:\/\/satoh.cs.uec.ac.jp\/SAKURA\/index.html."},{"key":"9_CR354","unstructured":"Satoh Labs and Morita Tech. Sasebo\/sakura quick start source codes. http:\/\/satoh.cs.uec.ac.jp\/SAKURA\/hardware.html."},{"key":"9_CR367","doi-asserted-by":"crossref","unstructured":"Liran Lerman, Romain Poussier, Gianluca Bontempi, Olivier Markowitch, and Fran\u00e7ois-Xavier Standaert. Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis). In Stefan Mangard and Axel Y. Poschmann, editors, Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13\u201314, 2015. Revised Selected Papers, volume 9064 of Lecture Notes in Computer Science, pages 20\u201333. Springer, 2015.","DOI":"10.1007\/978-3-319-21476-4_2"},{"key":"9_CR390","unstructured":"Stefan Mangard, Elisabeth Oswald, and Thomas Popp. Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security). Springer, feb 2007."},{"key":"9_CR399","unstructured":"Tsutomu Matsumoto, Shinichi Kawamura, Kouichi Fujisaki, Naoya Torii, Shuichi Ishida, Yukiyasu Tsunoo, Minoru Saeki, and Atsuhiro Yamagishi. Tamper-resistance standarization research committee report. The 2006 Symposium on Cryptography and Information Security, 2006."},{"key":"9_CR411","unstructured":"Thomas S. Messerges, Ezzy A. Dabbish, and Robert H. Sloan. Investigations of power analysis attacks on smartcards. In Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology, WOST\u201999, pages 17\u201317, Berkeley, CA, USA, 1999. USENIX Association."},{"key":"9_CR425","doi-asserted-by":"crossref","unstructured":"Amir Moradi. Statistical tools flavor side-channel collision attacks. In David Pointcheval and Thomas Johansson, editors, Advances in Cryptology - EUROCRYPT 2012, volume 7237 of Lecture Notes in Computer Science, pages 428\u2013445. Springer, 2012.","DOI":"10.1007\/978-3-642-29011-4_26"},{"key":"9_CR427","doi-asserted-by":"crossref","unstructured":"Athanassios Moschos, Apostolos P. Fournaris, and Odysseas Koufopavlou. A flexible leakage trace collection setup for arbitrary cryptographic ip cores. In 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 138\u2013142, April 2018.","DOI":"10.1109\/HST.2018.8383902"},{"key":"9_CR450","unstructured":"Colin O\u2019Flynn. Chipwhisperer. https:\/\/wiki.newae.com\/Main_Page."},{"key":"9_CR451","doi-asserted-by":"crossref","unstructured":"Colin O\u2019Flynn and Zhizhang (David) Chen. ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research, pages 243\u2013260. Springer International Publishing, Cham, 2014.","DOI":"10.1007\/978-3-319-10175-0_17"},{"key":"9_CR495","unstructured":"Rambus. Dpa workstation testing platform. http:\/\/info.rambus.com\/hubfs\/rambus.com\/Gated-Content\/Cryptography\/DPA-Workstation-Product-Brief.pdf."},{"key":"9_CR501","unstructured":"Riscure. Inspector: The side channel test tool. https:\/\/www.riscure.com\/security-tools\/inspector-sca\/."},{"key":"9_CR516","doi-asserted-by":"crossref","unstructured":"Tobias Schneider and Amir Moradi. Leakage assessment methodology. In International Workshop on Cryptographic Hardware and Embedded Systems, pages 495\u2013513. Springer, 2015.","DOI":"10.1007\/978-3-662-48324-4_25"},{"key":"9_CR532","unstructured":"Sergei Skorobogatov and Christopher Woods. In the blink of an eye: There goes your AES key, 2012."},{"key":"9_CR540","doi-asserted-by":"publisher","DOI":"10.1002\/0470848693","volume-title":"Security for Ubiquitous Computing","author":"Frank Stajano","year":"2002","unstructured":"Frank Stajano. Security for Ubiquitous Computing. John Wiley and Sons, February 2002."},{"key":"9_CR565","unstructured":"Rajesh Velegalati and Jens-Peter Kaps. Introducing FOBOS: Flexible Open-source BOard for Side-channel analysis. Work in Progress (WiP), Third International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2012, May 2012."},{"key":"9_CR566","unstructured":"Rajesh Velegalati and Jens-Peter Kaps. Towards a Flexible, Opensource BOard for Side-channel analysis (FOBOS). Cryptographic architectures embedded in reconfigurable devices, CRYPTARCHI 2013, June 2013."},{"key":"9_CR597","unstructured":"Liwei Zhang, A. Adam Ding, Francois Durvaux, Francois-Xavier Standaert, and Yunsi Fei. Towards sound and optimal leakage detection procedure. Cryptology ePrint Archive, Report 2017\/287, 2017. http:\/\/eprint.iacr.org\/2017\/287."}],"container-title":["Security of Ubiquitous Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-10591-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,17]],"date-time":"2023-10-17T17:43:20Z","timestamp":1697564600000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-10591-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030105907","9783030105914"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-10591-4_9","relation":{},"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"15 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}