SCAR: Power Side-Channel Analysis at RTL Level

被引:2
|
作者
Srivastava, Amisha [1 ]
Das, Sanjay [1 ]
Choudhury, Navnil [1 ]
Psiakis, Rafail [2 ]
Silva, Pedro Henrique [2 ]
Pal, Debjit [3 ]
Basu, Kanad [1 ]
机构
[1] Univ Texas Dallas, Dept Elect & Comp Engn, Richardson, TX 75080 USA
[2] Technol Innovat Inst, Secure Syst Res Ctr, Abu Dhabi, U Arab Emirates
[3] Univ Illinois, Dept Elect & Comp Engn, Chicago, IL 60607 USA
关键词
Encryption; Hardware; Power demand; Codes; Graph neural networks; Feature extraction; Task analysis; Graph neural network (GNN); large language model (LLM); power side-channel (PSC) attack; register-transfer level (RTL);
D O I
10.1109/TVLSI.2024.3390601
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Power side-channel (PSC) attacks exploit the dynamic power consumption of cryptographic operations to leak sensitive information about encryption hardware. Therefore, it is necessary to conduct a PSC analysis to assess the susceptibility of cryptographic systems and mitigate potential risks. Existing PSC analysis primarily focuses on postsilicon implementations, which are inflexible in addressing design flaws, leading to costly and time-consuming postfabrication design re-spins. Hence, presilicon PSC analysis is required for the early detection of vulnerabilities to improve design robustness. In this article, we introduce SCAR, a novel presilicon PSC analysis framework based on graph neural networks (GNNs). SCAR converts register-transfer level (RTL) designs of encryption hardware into control-data flow graphs (CDFGs) and use that to detect the design modules susceptible to side-channel leakage. Furthermore, we incorporate a deep-learning-based explainer in SCAR to generate quantifiable and human-accessible explanations of our detection and localization decisions. We have also developed a fortification component as a part of SCAR that uses large-language models (LLMs) to automatically generate and insert additional design code at the localized zone to shore up the side-channel leakage. When evaluated on popular encryption algorithms like advanced encryption standard (AES), RSA, and PRESENT, and postquantum cryptography (PQC) algorithms like Saber and CRYSTALS-Kyber, SCAR, achieves up to 94.49% localization accuracy, 100% precision, and 90.48% recall. Additionally, through explainability analysis, SCAR reduces features for GNN model training by 57% while maintaining comparable accuracy. We believe that SCAR will transform the security-critical hardware design cycle, resulting in faster design closure at a reduced design cost.
引用
收藏
页码:1110 / 1123
页数:14
相关论文
共 50 条
  • [21] Plaintext: A missing feature for enhancing the power of deep learning in side-channel analysis? Breaking multiple layers of side-channel countermeasures
    Hoang A.-T.
    Hanley N.
    O’Neill M.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (04): : 49 - 85
  • [22] Examining the Consequences of High-Level Synthesis Optimizations on Power Side-Channel
    Zhang, Lu
    Hu, Wei
    Ardeshiricham, Armaiti
    Tai, Yu
    Blackstone, Jeremy
    Mu, Dejun
    Kastner, Ryan
    PROCEEDINGS OF THE 2018 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2018, : 1167 - 1170
  • [23] High-level synthesis design flow for power side-channel security
    Zhang L.
    Mu D.
    Hu W.
    Tai Y.
    1600, Science Press (47): : 64 - 69
  • [24] Power Side-Channel Leakage Assessment Framework at Register-Transfer Level
    Pundir, Nitin
    Park, Jungmin
    Farahmandi, Farimah
    Tehranipoor, Mark
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2022, 30 (09) : 1207 - 1218
  • [25] A Power Side-Channel Attack on Flash ADC
    Chen, Ziyi
    Savidis, Ioannis
    2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS, 2023,
  • [26] Wireless Charging Power Side-Channel Attacks
    La Cour, Alexander S.
    Afridi, Khurram K.
    Suh, G. Edward
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 651 - 665
  • [27] Power Side-Channel Verification in Hardware Designs
    Alatoun, Khitam
    Vemuri, Ranga
    IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, NAECON 2024, 2024, : 291 - 296
  • [28] SCAR-FPGA: A NOVEL SIDE-CHANNEL ATTACK RESISTANT FPGA
    Mokari, Ali
    Ghavami, Behnam
    Pedram, Hossein
    2009 5TH SOUTHERN CONFERENCE ON PROGRAMMABLE LOGIC, PROCEEDINGS, 2009, : 177 - 182
  • [29] Power analysis based side-channel attack on visible light communication
    Yucebas, Damla
    Yuksel, Heba
    PHYSICAL COMMUNICATION, 2018, 31 : 196 - 202
  • [30] Deep Learning Method for Power Side-Channel Analysis on Chip Leakages
    Ahmed, Amjed Abbas
    Salim, Rana Ali
    Hasan, Mohammad Kamrul
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2023, 29 (06) : 50 - 57