Sleuth: Automated Verification of Software Power Analysis Countermeasures.
Ali Galip BayrakFrancesco RegazzoniDavid NovoPaolo IennePublished in: CHES (2013)
Keyphrases
- countermeasures
- power analysis
- automated verification
- differential power analysis
- information security
- smart card
- model checking
- formal verification
- security measures
- source code
- computer systems
- elliptic curve
- databases
- information technology
- expert systems
- static analysis
- case study
- information systems
- artificial intelligence