On the Automatic Construction of Indistinguishable OperationsManuel Barbosa, Dan Page, On the Automatic Construction of Indistinguishable Operations. Cryptography And Coding, pp. 233–247. November 2005. No electronic version available.
An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel attack. One well studied methodology for defending against such attacks is the concept of indistinguishable functions which leak no information about program control flow since all execution paths are computationally identical. However, constructing such functions by hand becomes laborious and error prone as their complexity increases. We investigate techniques for automating this process and find that effective solutions can be constructed with only minor amounts of computational effort.