Explore the words cloud of the SEAL project. It provides you a very rough idea of what is the project "SEAL" about.
The following table provides information about the project.
|Coordinator Country||Austria [AT]|
|Total cost||1˙946˙995 €|
|EC max contribution||1˙946˙995 € (100%)|
1. H2020-EU.1.1. (EXCELLENT SCIENCE - European Research Council (ERC))
|Duration (year-month-day)||from 2017-09-01 to 2023-08-31|
Take a look of project's partnership.
|1||UNIVERSITAET KLAGENFURT||AT (KLAGENFURT)||coordinator||1˙766˙803.00|
|2||UNIVERSITY OF BRISTOL||UK (BRISTOL)||participant||180˙191.00|
Side channel attacks use, alongside information such as plaintexts or ciphertexts, leakage about the (secret) key-dependent intermediate state(s), and deliver a `key ranking' as a result. Kocher's attacks   showed that for many practical implementations, observing a few encryptions made complete key recovery possible in practice. The academic research into combating these attacks so far has largely focused on approaches and tools to equip specialised cryptographic engineers with access to a specialist lab and tools.
The research hypothesis of this CoG is that one can make meaningful statements about the leakage behaviour of arbitrary implementations on small devices by utilising a-priori derived (instruction level) leakage models. Our vision is to enable developers with limited domain-specific knowledge to perform side channel evaluations at design time without access to a fully equipped lab, by creating tools and methodologies that integrate a priori derived instruction-level leakage models into a standard compiler.
This vision is articulated in three overarching research objectives:
1. Designing novel profiling strategies (WP1) including novel leakage acquisition techniques to generate leakage models for a specific target device.
2. Developing fast and comprehensive methods to support rapid evaluations (WP2).
3. Integration (WP3) of semantics, syntax and tools capable of using profiling information into a standard compiler with the aim to evaluate and improve the side channel resilience of the target code.
Addressing these goals simultaneously is required to make substantial progress towards the overall vision of this project.
As a final result, we will make demonstrators available (WP4): using a off-the shelf components, we supply the necessary tools and compiler enhancements including samples of cryptographic implementations to conduct analyses and demonstrate improvements regarding side channel resilience.
|year||authors and title||journal||last update|
Joseph Green, Arnab Roy, Elisabeth Oswald
A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES
published pages: , ISSN: , DOI:
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "SEAL" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (email@example.com) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "SEAL" are provided by the European Opendata Portal: CORDIS opendata.