Explore the words cloud of the REASSURE project. It provides you a very rough idea of what is the project "REASSURE" about.
The following table provides information about the project.
Coordinator |
UNIVERSITE CATHOLIQUE DE LOUVAIN
Organization address contact info |
Coordinator Country | Belgium [BE] |
Project website | http://reassure.eu/ |
Total cost | 3˙528˙635 € |
EC max contribution | 3˙478˙747 € (99%) |
Programme |
1. H2020-EU.3.7. (Secure societies - Protecting freedom and security of Europe and its citizens) 2. H2020-EU.2.1.1. (INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies - Information and Communication Technologies (ICT)) |
Code Call | H2020-DS-LEIT-2016 |
Funding Scheme | RIA |
Starting year | 2017 |
Duration (year-month-day) | from 2017-01-01 to 2020-03-31 |
Take a look of project's partnership.
# | ||||
---|---|---|---|---|
1 | UNIVERSITE CATHOLIQUE DE LOUVAIN | BE (LOUVAIN LA NEUVE) | coordinator | 831˙624.00 |
2 | NXP SEMICONDUCTORS GERMANY GMBH | DE (HAMBURG) | participant | 875˙706.00 |
3 | RISCURE BV | NL (DELFT) | participant | 749˙254.00 |
4 | UNIVERSITY OF BRISTOL | UK (BRISTOL) | participant | 518˙863.00 |
5 | IDEMIA FRANCE | FR (COLOMBES) | participant | 244˙661.00 |
6 | IDEMIA IDENTITY & SECURITY FRANCE | FR (COURBEVOIE) | participant | 143˙566.00 |
7 | UNIVERSITAET KLAGENFURT | AT (KLAGENFURT) | participant | 73˙820.00 |
8 | SECRETARIAT GENERAL DE LA DEFENSE ET DE LA SECURITE NATIONALE | FR (PARIS 07 SP) | participant | 41˙250.00 |
Implementing cryptography on embedded devices is an ongoing challenge: every year new implementation flaws are discovered and new attack paths are being used by real life adversaries. Whilst cryptography can guarantee many security properties, it crucially depends on the ability to keep the used keys secret even in face of determined adversaries. Over the last two decades a new type of adversary has emerged, able to obtain, from the cryptographic implementation, side channel leakage such as recording of response times, power or EM signals, etc. To account for such adversaries, sophisticated security certification and evaluation methods (Common Criteria, EMVCo, FIPS…) have been established to give users assurance that security claims have withstood independent evaluation and testing. Recently the reliability of these evaluations has come into the spotlight: the Taiwanese citizen card proved to be insecure, and Snowden’s revelations about NSA's tampering with FIPS standards eroded public confidence. REASSURE will (1) improve the efficiency and quality of all aspects of certification using a novel, structured detect-map-exploit approach that will also improve the comparability of independently conducted evaluations, (2) cater for emerging areas such as the IoT by automating leakage assessment practices in order to allow resistance assessment without immediate access to a testing lab, (3) deliver tools to stakeholders, such as reference data sets and an open-source leakage simulator based on instruction-level profiles for a processor relevant for the IoT, (4) improve existing standards by actively pushing the novel results to standardization bodies. REASSURE's consortium is ideal to tackle such ambitious tasks. It features two major circuits manufacturers (NXP, IDEMIA), a highly respected side channel testing lab (Riscure), an engaged governmental representative (ANSSI), and two of the most prominent research institutions in this field (UCL, University of Bristol).
Interim report on shortcut formulas | Documents, reports | 2019-09-04 15:51:02 |
Data management plan | Documents, reports | 2019-09-04 15:51:02 |
Report on instruction level profiling | Documents, reports | 2019-09-04 15:51:02 |
Web site and repository | Websites, patent fillings, videos etc. | 2019-09-04 15:51:02 |
Interim report on automation | Documents, reports | 2019-09-04 15:51:02 |
White paper on shortcut formulas | Documents, reports | 2019-09-04 15:51:02 |
Take a look to the deliverables list in detail: detailed list of REASSURE deliverables.
year | authors and title | journal | last update |
---|---|---|---|
2019 |
Itamar Levi, Davide Bellizia, François-Xavier Standaert Reducing a Masked Implementation’s Effective Security Order with Setup Manipulations published pages: 2933-317, ISSN: 2569-2925, DOI: 10.13154/tches.v2019.i2.293-317 |
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019, N°2 | 2020-04-01 |
2019 |
Weijia Wang, Yu Yu, Francois-Xavier Standaert Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations published pages: 3069-3082, ISSN: 1556-6013, DOI: 10.1109/tifs.2019.2912549 |
IEEE Transactions on Information Forensics and Security 14/11 | 2020-04-01 |
2019 |
Olivier Bronchain, Tobias Schneider, François-Xavier Standaert Multi-Tuple Leakage Detection and the Dependent Signal Issue published pages: 318-345, ISSN: 2569-2925, DOI: 10.13154/tches.v2019.i2.318-345 |
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019, N°2 | 2020-04-01 |
2018 |
Liran Lerman, Romain Poussier, Olivier Markowitch, François-Xavier Standaert Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version published pages: 301-313, ISSN: 2190-8508, DOI: 10.1007/s13389-017-0162-9 |
Journal of Cryptographic Engineering 8/4 | 2020-04-01 |
2018 |
Weijia Wang, Yu Yu, Francois-Xavier Standaert, Junrong Liu, Zheng Guo, Dawu Gu Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips published pages: 1301-1316, ISSN: 1556-6013, DOI: 10.1109/tifs.2017.2787985 |
IEEE Transactions on Information Forensics and Security 13/5 | 2020-04-01 |
2018 |
Emmanuel Prouff
Remi Strullu
Ryad Benadjila
Eleonora Cagli
Cecile Dumas Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database published pages: , ISSN: , DOI: |
2019-09-04 | |
2018 |
Si Gao Modelling M0 leakage generically - How different can leakages be among different M0 devices? published pages: , ISSN: , DOI: |
ARM Research Summit 2018 | 2019-09-04 |
2017 |
Erick Nascimento, Åukasz Chmielewski Applying Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations published pages: 213-231, ISSN: , DOI: 10.1007/978-3-319-75208-2_13 |
CARDIS 2017 | 2019-09-04 |
2018 |
Vincent Grosso, François-Xavier Standaert Masking Proofs are Tight (and How to Exploit it in Security Evaluations published pages: 385-412, ISSN: , DOI: 10.1007/978-3-319-78375-8_13 |
EUROCRYPT 2018 | 2019-09-04 |
2017 |
David McCann, Elisabeth Oswald, Carolyn Whitnall ELMO: Emulating Leaks for the Arm Cortex-M0 without Access to a Side Channel Lab published pages: , ISSN: , DOI: |
ARM Research Summit 2017 | 2019-09-04 |
2018 |
Emmanuel Prouff Efficient Evaluation of the Success Rate in Side-Channel Attacks published pages: , ISSN: , DOI: |
Second Theory of Implementation Security (TIs) Workshop | 2019-09-04 |
2017 |
A. Adam Ding, Liwei Zhang, Francois Durvaux, Francois-Xavier Standaert, Yunsi Fei Towards Sound and Optimal Leakage Detection Procedure published pages: 105-122, ISSN: , DOI: 10.1007/978-3-319-75208-2_7 |
CARDIS 2017 | 2019-09-04 |
2017 |
Elisabeth Oswald Catch me if you can : Locating (and fixing) side channel leaks (for dummies) published pages: , ISSN: , DOI: |
2019-09-04 | |
2018 |
Guilherme Perin
Baris Ege
Jasper van Woudenberg Lowering the bar: deep learning for side-channel analysis published pages: , ISSN: , DOI: |
2019-09-04 | |
2018 |
M. Azouaoui
V. Verneuil Attaques par canaux auxiliaires sur AES – Partie 1 published pages: , ISSN: 1631-9036, DOI: |
MISC : le magazine de la seÌcuriteÌ informatique 97 | 2019-09-04 |
2017 |
Eleonora Cagli, Cécile Dumas, Emmanuel Prouff Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing published pages: 45-68, ISSN: , DOI: 10.1007/978-3-319-66787-4_3 |
CHES 2017 | 2019-09-04 |
2018 |
François-Xavier Standaert Attaques par Canaux Auxiliaires : Evaluations de Sécurité à Court et Long Terme published pages: , ISSN: 1631-9036, DOI: |
MISC : le magazine de la seÌcuriteÌ informatique 99 | 2019-09-04 |
2017 |
Anthony Journault, François-Xavier Standaert Very High Order Masking: Efficient Implementation and Security Evaluation published pages: 623-643, ISSN: , DOI: 10.1007/978-3-319-66787-4_30 |
CHES 2017 | 2019-09-04 |
2017 |
Romain Poussier, Yuanyuan Zhou, François-Xavier Standaert A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks published pages: 534-554, ISSN: , DOI: 10.1007/978-3-319-66787-4_26 |
CARDIS 2017 | 2019-09-04 |
2018 |
Ryad BENADJILA
Eleonora CAGLI
Cécile DUMAS
Emmanuel PROUFF
Rémi STRULLU Open Database of Side Channel Traces for Deep Learning published pages: , ISSN: , DOI: |
2019-09-04 | |
2018 |
Praveen Baburao Kulkarni Deep Learning Techniques for Side Channel Analysis published pages: , ISSN: , DOI: |
2019-09-04 | |
2018 |
Ryad Benadjila
Victor Lomné
Emmanuel Prouff
Thomas Roche Secure AES128 for ATMega8515 published pages: , ISSN: , DOI: |
2019-09-04 | |
2018 |
Liran Lerman, Nikita Veshchikov, Olivier Markowitch, Francois-Xavier Standaert Start Simple and then Refine: Bias-Variance Decomposition as a Diagnosis Tool for Leakage Profiling published pages: 268-283, ISSN: 0018-9340, DOI: 10.1109/tc.2017.2731342 |
IEEE Transactions on Computers 67/2 | 2019-09-04 |
2018 |
Emmanuel Prouff Deep Learning for Embedded Security Evaluation published pages: , ISSN: , DOI: |
Workshop on Practical Hardware Innovation in Security and Characterization (PHISIC 2018) | 2019-09-04 |
2018 |
M. Azouaoui
V. Verneuil Attaques par canaux auxiliaires sur AES – Partie 2 published pages: , ISSN: 1631-9036, DOI: |
MISC : le magazine de la seÌcuriteÌ informatique 98 | 2019-09-04 |
2017 |
Romain Poussier, Qian Guo, François-Xavier Standaert, Claude Carlet, Sylvain Guilley Connecting and Improving Direct Sum Masking and Inner Product Masking published pages: 123-141, ISSN: , DOI: 10.1007/978-3-319-75208-2_8 |
CRYPTO 2017 | 2019-09-04 |
2017 |
Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang Categorising and Comparing Cluster-Based DPA Distinguishers published pages: 442-458, ISSN: , DOI: 10.1007/978-3-319-72565-9_23 |
SAC 2017 | 2019-09-04 |
2017 |
Santos Merino del Pozo, François-Xavier Standaert Getting the Most Out of Leakage Detection - Statistical tools and measurement setups hand in hand published pages: 264-281, ISSN: , DOI: 10.1007/978-3-319-64647-3_16 |
COSADE 2017 | 2019-09-04 |
2017 |
David McCann, Elisabeth Oswald, Carolyn Whitnall Towards Practical Tools for Side Channel Aware Software Engineering: ‘Grey Box’ Modelling for Instruction Leakages published pages: , ISSN: , DOI: |
USENIX Security Symposium 2017 | 2019-09-04 |
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "REASSURE" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "REASSURE" are provided by the European Opendata Portal: CORDIS opendata.
Compositional security certification for medium- to high-assurance COTS-based systems in environments with emerging threats
Read MoreVERIFICATION ENGINEERING OF SAFETY AND SECURITY CRITICAL DYNAMIC INDUSTRIAL APPLICATIONS
Read MoreAdvanced Networked Agents for Security and Trust Assessment in CPS/IOT Architectures
Read More