Opendata, web and dolomites


Sound and Early Assessment of Leakage for Embedded Software

Total Cost €


EC-Contrib. €






Project "SEAL" data sheet

The following table provides information about the project.


Organization address
postcode: 9020

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Austria [AT]
 Total cost 1˙946˙995 €
 EC max contribution 1˙946˙995 € (100%)
 Programme 1. H2020-EU.1.1. (EXCELLENT SCIENCE - European Research Council (ERC))
 Code Call ERC-2016-COG
 Funding Scheme ERC-COG
 Starting year 2017
 Duration (year-month-day) from 2017-09-01   to  2023-08-31


Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    UNIVERSITAET KLAGENFURT AT (KLAGENFURT) coordinator 1˙766˙803.00
2    UNIVERSITY OF BRISTOL UK (BRISTOL) participant 180˙191.00


 Project objective

Side channel attacks use, alongside information such as plaintexts or ciphertexts, leakage about the (secret) key-dependent intermediate state(s), and deliver a `key ranking' as a result. Kocher's attacks [15] [16] showed that for many practical implementations, observing a few encryptions made complete key recovery possible in practice. The academic research into combating these attacks so far has largely focused on approaches and tools to equip specialised cryptographic engineers with access to a specialist lab and tools.

The research hypothesis of this CoG is that one can make meaningful statements about the leakage behaviour of arbitrary implementations on small devices by utilising a-priori derived (instruction level) leakage models. Our vision is to enable developers with limited domain-specific knowledge to perform side channel evaluations at design time without access to a fully equipped lab, by creating tools and methodologies that integrate a priori derived instruction-level leakage models into a standard compiler.

This vision is articulated in three overarching research objectives:

1. Designing novel profiling strategies (WP1) including novel leakage acquisition techniques to generate leakage models for a specific target device.

2. Developing fast and comprehensive methods to support rapid evaluations (WP2).

3. Integration (WP3) of semantics, syntax and tools capable of using profiling information into a standard compiler with the aim to evaluate and improve the side channel resilience of the target code.

Addressing these goals simultaneously is required to make substantial progress towards the overall vision of this project.

As a final result, we will make demonstrators available (WP4): using a off-the shelf components, we supply the necessary tools and compiler enhancements including samples of cryptographic implementations to conduct analyses and demonstrate improvements regarding side channel resilience.


year authors and title journal last update
List of publications.
2018 Joseph Green, Arnab Roy, Elisabeth Oswald
A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES
published pages: , ISSN: , DOI:
CARDIS 2018 2019-12-02

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "SEAL" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email ( and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "SEAL" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.1.1.)


The Enemy of the Good: Towards a Theory of Moral Progress

Read More  


The Mass Politics of Disintegration

Read More  

DigitalValues (2019)

The Construction of Values in Digital Spheres

Read More