Opendata, web and dolomites

REASSURE SIGNED

Robust and Efficient Approaches to Evaluating Side Channel and Fault Attack Resilience

Total Cost €

0

EC-Contrib. €

0

Partnership

0

Views

0

 REASSURE project word cloud

Explore the words cloud of the REASSURE project. It provides you a very rough idea of what is the project "REASSURE" about.

certification    attack    simulator    manufacturers    reassure    actively    claims    comparability    ucl    tampering    insecure    adversary    snowden    spotlight    adversaries    cryptography    engaged    nsa    flaws    stakeholders    automating    emvco    depends    taiwanese    pushing    fips    efficiency    ongoing    security    obtain    standards    cater    lab    university    idemia    withstood    signals    recording    power    practices    cryptographic    keys    respected    tools    discovered    emerged    em    criteria    processor    public    circuits    guarantee    confidence    evaluation    prominent    sophisticated    implementing    representative    determined    iot    source    reference    bristol    bodies    independent    profiles    ideal    leakage    reliability    nxp    citizen    eroded    anssi    paths    last    decades    assurance    evaluations    quality    data    whilst    revelations    detect    proved    card    channel    governmental    tackle    riscure    crucially    give    life    of    map    times    independently    standardization    instruction    keep    structured    secret    resistance   

Project "REASSURE" data sheet

The following table provides information about the project.

Coordinator
UNIVERSITE CATHOLIQUE DE LOUVAIN 

Organization address
address: PLACE DE L UNIVERSITE 1
city: LOUVAIN LA NEUVE
postcode: 1348
website: www.uclouvain.be

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Belgium [BE]
 Project website http://reassure.eu/
 Total cost 3˙528˙635 €
 EC max contribution 3˙478˙747 € (99%)
 Programme 1. H2020-EU.3.7. (Secure societies - Protecting freedom and security of Europe and its citizens)
2. H2020-EU.2.1.1. (INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies - Information and Communication Technologies (ICT))
 Code Call H2020-DS-LEIT-2016
 Funding Scheme RIA
 Starting year 2017
 Duration (year-month-day) from 2017-01-01   to  2020-03-31

 Partnership

Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    UNIVERSITE CATHOLIQUE DE LOUVAIN BE (LOUVAIN LA NEUVE) coordinator 831˙624.00
2    NXP SEMICONDUCTORS GERMANY GMBH DE (HAMBURG) participant 875˙706.00
3    RISCURE BV NL (DELFT) participant 749˙254.00
4    UNIVERSITY OF BRISTOL UK (BRISTOL) participant 518˙863.00
5    IDEMIA FRANCE FR (COLOMBES) participant 244˙661.00
6    IDEMIA IDENTITY & SECURITY FRANCE FR (COURBEVOIE) participant 143˙566.00
7    UNIVERSITAET KLAGENFURT AT (KLAGENFURT) participant 73˙820.00
8    SECRETARIAT GENERAL DE LA DEFENSE ET DE LA SECURITE NATIONALE FR (PARIS 07 SP) participant 41˙250.00

Map

 Project objective

Implementing cryptography on embedded devices is an ongoing challenge: every year new implementation flaws are discovered and new attack paths are being used by real life adversaries. Whilst cryptography can guarantee many security properties, it crucially depends on the ability to keep the used keys secret even in face of determined adversaries. Over the last two decades a new type of adversary has emerged, able to obtain, from the cryptographic implementation, side channel leakage such as recording of response times, power or EM signals, etc. To account for such adversaries, sophisticated security certification and evaluation methods (Common Criteria, EMVCo, FIPS…) have been established to give users assurance that security claims have withstood independent evaluation and testing. Recently the reliability of these evaluations has come into the spotlight: the Taiwanese citizen card proved to be insecure, and Snowden’s revelations about NSA's tampering with FIPS standards eroded public confidence. REASSURE will (1) improve the efficiency and quality of all aspects of certification using a novel, structured detect-map-exploit approach that will also improve the comparability of independently conducted evaluations, (2) cater for emerging areas such as the IoT by automating leakage assessment practices in order to allow resistance assessment without immediate access to a testing lab, (3) deliver tools to stakeholders, such as reference data sets and an open-source leakage simulator based on instruction-level profiles for a processor relevant for the IoT, (4) improve existing standards by actively pushing the novel results to standardization bodies. REASSURE's consortium is ideal to tackle such ambitious tasks. It features two major circuits manufacturers (NXP, IDEMIA), a highly respected side channel testing lab (Riscure), an engaged governmental representative (ANSSI), and two of the most prominent research institutions in this field (UCL, University of Bristol).

 Deliverables

List of deliverables.
Interim report on shortcut formulas Documents, reports 2019-09-04 15:51:02
Data management plan Documents, reports 2019-09-04 15:51:02
Report on instruction level profiling Documents, reports 2019-09-04 15:51:02
Web site and repository Websites, patent fillings, videos etc. 2019-09-04 15:51:02
Interim report on automation Documents, reports 2019-09-04 15:51:02
White paper on shortcut formulas Documents, reports 2019-09-04 15:51:02

Take a look to the deliverables list in detail:  detailed list of REASSURE deliverables.

 Publications

year authors and title journal last update
List of publications.
2019 Itamar Levi, Davide Bellizia, François-Xavier Standaert
Reducing a Masked Implementation’s Effective Security Order with Setup Manipulations
published pages: 2933-317, ISSN: 2569-2925, DOI: 10.13154/tches.v2019.i2.293-317
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019, N°2 2020-04-01
2019 Weijia Wang, Yu Yu, Francois-Xavier Standaert
Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations
published pages: 3069-3082, ISSN: 1556-6013, DOI: 10.1109/tifs.2019.2912549
IEEE Transactions on Information Forensics and Security 14/11 2020-04-01
2019 Olivier Bronchain, Tobias Schneider, François-Xavier Standaert
Multi-Tuple Leakage Detection and the Dependent Signal Issue
published pages: 318-345, ISSN: 2569-2925, DOI: 10.13154/tches.v2019.i2.318-345
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019, N°2 2020-04-01
2018 Liran Lerman, Romain Poussier, Olivier Markowitch, François-Xavier Standaert
Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version
published pages: 301-313, ISSN: 2190-8508, DOI: 10.1007/s13389-017-0162-9
Journal of Cryptographic Engineering 8/4 2020-04-01
2018 Weijia Wang, Yu Yu, Francois-Xavier Standaert, Junrong Liu, Zheng Guo, Dawu Gu
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips
published pages: 1301-1316, ISSN: 1556-6013, DOI: 10.1109/tifs.2017.2787985
IEEE Transactions on Information Forensics and Security 13/5 2020-04-01
2018 Emmanuel Prouff Remi Strullu Ryad Benadjila Eleonora Cagli Cecile Dumas
Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database
published pages: , ISSN: , DOI:
2019-09-04
2018 Si Gao
Modelling M0 leakage generically - How different can leakages be among different M0 devices?
published pages: , ISSN: , DOI:
ARM Research Summit 2018 2019-09-04
2017 Erick Nascimento, Łukasz Chmielewski
Applying Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations
published pages: 213-231, ISSN: , DOI: 10.1007/978-3-319-75208-2_13
CARDIS 2017 2019-09-04
2018 Vincent Grosso, François-Xavier Standaert
Masking Proofs are Tight (and How to Exploit it in Security Evaluations
published pages: 385-412, ISSN: , DOI: 10.1007/978-3-319-78375-8_13
EUROCRYPT 2018 2019-09-04
2017 David McCann, Elisabeth Oswald, Carolyn Whitnall
ELMO: Emulating Leaks for the Arm Cortex-M0 without Access to a Side Channel Lab
published pages: , ISSN: , DOI:
ARM Research Summit 2017 2019-09-04
2018 Emmanuel Prouff
Efficient Evaluation of the Success Rate in Side-Channel Attacks
published pages: , ISSN: , DOI:
Second Theory of Implementation Security (TIs) Workshop 2019-09-04
2017 A. Adam Ding, Liwei Zhang, Francois Durvaux, Francois-Xavier Standaert, Yunsi Fei
Towards Sound and Optimal Leakage Detection Procedure
published pages: 105-122, ISSN: , DOI: 10.1007/978-3-319-75208-2_7
CARDIS 2017 2019-09-04
2017 Elisabeth Oswald
Catch me if you can : Locating (and fixing) side channel leaks (for dummies)
published pages: , ISSN: , DOI:
2019-09-04
2018 Guilherme Perin Baris Ege Jasper van Woudenberg
Lowering the bar: deep learning for side-channel analysis
published pages: , ISSN: , DOI:
2019-09-04
2018 M. Azouaoui V. Verneuil
Attaques par canaux auxiliaires sur AES – Partie 1
published pages: , ISSN: 1631-9036, DOI:
MISC : le magazine de la sécurité informatique 97 2019-09-04
2017 Eleonora Cagli, Cécile Dumas, Emmanuel Prouff
Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing
published pages: 45-68, ISSN: , DOI: 10.1007/978-3-319-66787-4_3
CHES 2017 2019-09-04
2018 François-Xavier Standaert
Attaques par Canaux Auxiliaires : Evaluations de Sécurité à Court et Long Terme
published pages: , ISSN: 1631-9036, DOI:
MISC : le magazine de la sécurité informatique 99 2019-09-04
2017 Anthony Journault, François-Xavier Standaert
Very High Order Masking: Efficient Implementation and Security Evaluation
published pages: 623-643, ISSN: , DOI: 10.1007/978-3-319-66787-4_30
CHES 2017 2019-09-04
2017 Romain Poussier, Yuanyuan Zhou, François-Xavier Standaert
A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks
published pages: 534-554, ISSN: , DOI: 10.1007/978-3-319-66787-4_26
CARDIS 2017 2019-09-04
2018 Ryad BENADJILA Eleonora CAGLI Cécile DUMAS Emmanuel PROUFF Rémi STRULLU
Open Database of Side Channel Traces for Deep Learning
published pages: , ISSN: , DOI:
2019-09-04
2018 Praveen Baburao Kulkarni
Deep Learning Techniques for Side Channel Analysis
published pages: , ISSN: , DOI:
2019-09-04
2018 Ryad Benadjila Victor Lomné Emmanuel Prouff Thomas Roche
Secure AES128 for ATMega8515
published pages: , ISSN: , DOI:
2019-09-04
2018 Liran Lerman, Nikita Veshchikov, Olivier Markowitch, Francois-Xavier Standaert
Start Simple and then Refine: Bias-Variance Decomposition as a Diagnosis Tool for Leakage Profiling
published pages: 268-283, ISSN: 0018-9340, DOI: 10.1109/tc.2017.2731342
IEEE Transactions on Computers 67/2 2019-09-04
2018 Emmanuel Prouff
Deep Learning for Embedded Security Evaluation
published pages: , ISSN: , DOI:
Workshop on Practical Hardware Innovation in Security and Characterization (PHISIC 2018) 2019-09-04
2018 M. Azouaoui V. Verneuil
Attaques par canaux auxiliaires sur AES – Partie 2
published pages: , ISSN: 1631-9036, DOI:
MISC : le magazine de la sécurité informatique 98 2019-09-04
2017 Romain Poussier, Qian Guo, François-Xavier Standaert, Claude Carlet, Sylvain Guilley
Connecting and Improving Direct Sum Masking and Inner Product Masking
published pages: 123-141, ISSN: , DOI: 10.1007/978-3-319-75208-2_8
CRYPTO 2017 2019-09-04
2017 Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang
Categorising and Comparing Cluster-Based DPA Distinguishers
published pages: 442-458, ISSN: , DOI: 10.1007/978-3-319-72565-9_23
SAC 2017 2019-09-04
2017 Santos Merino del Pozo, François-Xavier Standaert
Getting the Most Out of Leakage Detection - Statistical tools and measurement setups hand in hand
published pages: 264-281, ISSN: , DOI: 10.1007/978-3-319-64647-3_16
COSADE 2017 2019-09-04
2017 David McCann, Elisabeth Oswald, Carolyn Whitnall
Towards Practical Tools for Side Channel Aware Software Engineering: ‘Grey Box’ Modelling for Instruction Leakages
published pages: , ISSN: , DOI:
USENIX Security Symposium 2017 2019-09-04

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "REASSURE" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "REASSURE" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.3.7.;H2020-EU.2.1.1.)

certMILS (2017)

Compositional security certification for medium- to high-assurance COTS-based systems in environments with emerging threats

Read More  

VESSEDIA (2017)

VERIFICATION ENGINEERING OF SAFETY AND SECURITY CRITICAL DYNAMIC INDUSTRIAL APPLICATIONS

Read More  

ANASTACIA (2017)

Advanced Networked Agents for Security and Trust Assessment in CPS/IOT Architectures

Read More