This workpackage is focused on the analysis of the paradigm shift brought by the introduction of dynamic capabilities in secure devices, its opportunities and possible threats, from the theoretical point of view.
The objective of this workpackage is twofold. A security analysis will be perfomed to exhibit and study the potential of using deGoal for improving the security of an implementation with respect to physical attacks. Also, some uses cases of usage of de Goal to sensitive applications will also be defined.
The aim of this workpackage is to break the technological bottlenecks around the use of runtime code generation for secure devices: the demonstration of the capabilities brought by runtime code generation to improve the levels of security in secure elements. In this workpackage we will adapt the tool deGoal to implement features for security specified in WP1, and implement the use cases also defined in WP1.
This workpackage will deal with the performance analysis of the use cases setup in WP2.
The objective of this work package is to perform the security analysis of the runtime code generation described in work package 1 and embedded in the demonstrator of WP2. The security analysis will be conducted with to the state-of-the-art equipments of the microPacks platform, which includes side channel benches (for time, consumption and electromagnetic emission measurement) and fault injections means (power and clock glitches, laser, EM pulses).
The security analysis will consist:
in evaluating the difficulty for conducting a basic “reverse engineering” of the original code (i.e before its encoding with deGoal) with such equipements,
in evaluating the efficiency of the countermeasures (such as register renaming, use of algorithmic equivalence, etc. ) against side channel and fault attacks automatically inserted with deGoal,
in evaluating the new weaknesses eventually introduced by the use of runtime code generation.