skip to main content
10.1145/3520304.3534049acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
research-article

Opportunities for genetic improvement of cryptographic code

Published: 19 July 2022 Publication History

Abstract

Cryptography is one of the main tools underlying the security of our connected world. Cryptographic code must achieve both high security requirements and high performance. Automatic generation and genetic improvement of such code are underexplored, making cryptographic code a prime target for future research.
With the proliferation of computers into all aspects of human life, the amount of sensitive data being processed keeps increasing. As cryptography is one of the main tools underlying the security of our modern and connected world, cryptographic software must meet not only high security requirements, but also exhibit excellent nonfunctional properties, such as high performance and low energy consumption. Hence, we see cryptography as a prime target domain for single- and multi-objective code optimization.

References

[1]
Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, and François-Xavier Standaert. 2015. On the Cost of Lazy Engineering for Masked Software Implementations. In CARDIS. 64--81.
[2]
Jay Bosamiya, Sydney Gibson, Yao Li, Bryan Parno, and Chris Hawblitzel. 2020. Verified Transformations and Hoare Logic: Beautiful Proofs for Ugly Assembly Language. In VSTTE. 106--123.
[3]
Andres Erbsen, Jade Philipoom, Jason Gross, Robert Sloan, and Adam Chlipala. 2019. Simple High-Level Code for Cryptographic Arithmetic - With Proofs, Without Compromises. In IEEE SP. 1202--1219.
[4]
Matteo Frigo. 1999. A Fast Fourier Transform Compiler. In PLDI. 169--180.
[5]
Qian Ge, Yuval Yarom, David Cock, and Gernot Heiser. 2018. A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. J. Cryptogr. Eng. 8, 1 (2018), 1--27.
[6]
Yuval Ishai, Amit Sahai, and David A. Wagner. 2003. Private Circuits: Securing Hardware against Probing Attacks. In CRYPTO. 463--481.
[7]
Herbert Jordan, Peter Thoman, Juan Jose Durillo Barrionuevo, Simone Pellegrini, Philipp Gschwandtner, Thomas Fahringer, and Hans Moritsch. 2012. A multi-objective auto-tuning framework for parallel codes. In SC.
[8]
Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential Power Analysis. In CRYPTO. 388--397.
[9]
Fernanda Kri and Marc Feeley. 2004. Genetic Instruction Scheduling and Register Allocation. In SCCC. 76--83.
[10]
Stefan Mangard, Elisabeth Oswald, and Thomas Popp. 2007. Power analysis attacks - revealing the secrets of smart cards. Springer.
[11]
Ken Naono, Keita Teranishi, John Cavazos, and Reiji Suda (Eds.). 2010. Software Automatic Tuning From Concepts to State-of-the-Art Results. Springer Science+Business Media.
[12]
Hannah Peeler, Shuyue Stella Li, Andrew N. Sloss, Kenneth N. Reid, Yuan Yuan, and Wolfgang Banzhaf. 2022. Optimizing LLVM Pass Sequences with Shackleton: A Linear Genetic Programming Framework. arXiv 2201.13305.
[13]
Justyna Petke, Saemundur O. Haraldsson, Mark Harman, William B. Langdon, David R. White, and John R. Woodward. 2018. Genetic Improvement of Software: A Comprehensive Survey. IEEE Transactions on Evolutionary Computation 22, 3 (2018), 415--432.
[14]
Madura A. Shelton, Lukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, and Yuval Yarom. 2021. Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code. In CCS. 685--699.
[15]
Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, and Yuval Yarom. 2021. Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. In NDSS.

Index Terms

  1. Opportunities for genetic improvement of cryptographic code
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          GECCO '22: Proceedings of the Genetic and Evolutionary Computation Conference Companion
          July 2022
          2395 pages
          ISBN:9781450392686
          DOI:10.1145/3520304
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Sponsors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 19 July 2022

          Permissions

          Request permissions for this article.

          Check for updates

          Qualifiers

          • Research-article

          Conference

          GECCO '22
          Sponsor:

          Acceptance Rates

          Overall Acceptance Rate 1,669 of 4,410 submissions, 38%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • 0
            Total Citations
          • 27
            Total Downloads
          • Downloads (Last 12 months)2
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 20 Feb 2025

          Other Metrics

          Citations

          View Options

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Figures

          Tables

          Media

          Share

          Share

          Share this Publication link

          Share on social media