Post-Layout Estimation of Side-Channel Power Supply Signatures

被引:0
|
作者
Rao, Sushmita Kadiyala [1 ]
Krishnankutty, Deepak [1 ]
Robucci, Ryan [1 ]
Banerjee, Nilanjan [1 ]
Patel, Chintan [1 ]
机构
[1] Univ Maryland Baltimore Cty, Dept Comp Sci & Elect Engn, Baltimore, MD 21228 USA
关键词
Hardware Security; Trojan Detection; Side-channel attacks; Power Supply analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Two major security challenges for integrated circuits (IC) that involve encryption cores are side-channel based attacks and malicious hardware insertions (trojans). Side-channel attacks predominantly use power supply measurements to exploit the correlation of power consumption with the underlying logic operations on an IC. Practical attacks have been demonstrated using power supply traces and either plaintext or cipher-text collected during encryption operations. Also, several techniques that detect trojans rely on detecting anomalies in the power supply in combination with other circuit parameters. Countermeasures against these side-channel attacks as well as detection schemes for hardware trojans are required and rely on accurate pre-fabrication power consumption predictions. However, available state-of-the-art techniques would require prohibitive full-chip SPICE simulations. In this work, we present an optimized technique to accurately estimate the power supply signatures that require significantly less computational resources, thus enabling integration of Design-for-Security (DfS) based paradigms. To demonstrate the effectiveness of our technique, we present data for a DES crypto-system that proves that our framework can identify vulnerabilities to Differential Power Analysis (DPA) attacks. Our framework can be generically applied to other crypto-systems and can handle larger IC designs without loss of accuracy.
引用
收藏
页码:92 / 95
页数:4
相关论文
共 50 条
  • [21] Passive Side-Channel Interference Estimation for WiFi Networks
    Onalan, Aysun Gurur
    Kurtoglu, Mehmet Hakan
    Soyak, Eren
    2021 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE BLACKSEACOM), 2021, : 225 - 230
  • [22] Quantitative estimation of side-channel leaks with neural networks
    Tizpaz-Niari, Saeid
    Cerny, Pavol
    Sankaranarayanan, Sriram
    Trivedi, Ashutosh
    INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2021, 23 (04) : 641 - 654
  • [23] Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags
    Plos, Thomas
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 444 - 458
  • [24] Practical methodology of post-layout gate sizing for 15% Moire power saving
    Miura, N
    Kato, N
    Kuroda, T
    ASP-DAC 2004: PROCEEDINGS OF THE ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, 2004, : 434 - 437
  • [25] Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures
    Pessl, Peter
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 : 153 - 170
  • [26] A Fast Transient Response Distributed Power Supply With Dynamic Output Switching for Power Side-Channel Attack Mitigation
    Liu, Xingye
    Ampadu, Paul
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2025, 33 (01) : 261 - 274
  • [27] Fast and Comprehensive Simulation Methodology for Layout-Based Power-Noise Side-Channel Leakage Analysis
    Lin, Lang
    Selvakumaran, Dinesh
    Zhu, Deqi
    Chang, Norman
    Chow, Calvin
    Nagata, Makoto
    Monta, Kazuki
    2020 6TH IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2020) (FORMERLY INIS), 2020, : 133 - 138
  • [28] Power Side-Channel Attacks in Negative Capacitance Transistor
    Knechtel, Johann
    Patnaik, Satwik
    Nabeel, Mohammed
    Ashraf, Mohammed
    Chauhan, Yogesh S.
    Henkel, Jorg
    Sinanoglu, Ozgur
    Amrouch, Hussam
    IEEE MICRO, 2020, 40 (06) : 74 - 83
  • [29] On Code Execution Tracking via Power Side-Channel
    Liu, Yannan
    Wei, Lingxiao
    Zhou, Zhe
    Zhang, Kehuan
    Xu, Wenyuan
    Xu, Qiang
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1019 - 1031
  • [30] Open DNN Box by Power Side-Channel Attack
    Xiang, Yun
    Chen, Zhuangzhi
    Chen, Zuohui
    Fang, Zebin
    Hao, Haiyang
    Chen, Jinyin
    Liu, Yi
    Wu, Zhefu
    Xuan, Qi
    Yang, Xiaoniu
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2020, 67 (11) : 2717 - 2721