Post-Layout Estimation of Side-Channel Power Supply Signatures

被引:0
|
作者
Rao, Sushmita Kadiyala [1 ]
Krishnankutty, Deepak [1 ]
Robucci, Ryan [1 ]
Banerjee, Nilanjan [1 ]
Patel, Chintan [1 ]
机构
[1] Univ Maryland Baltimore Cty, Dept Comp Sci & Elect Engn, Baltimore, MD 21228 USA
关键词
Hardware Security; Trojan Detection; Side-channel attacks; Power Supply analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Two major security challenges for integrated circuits (IC) that involve encryption cores are side-channel based attacks and malicious hardware insertions (trojans). Side-channel attacks predominantly use power supply measurements to exploit the correlation of power consumption with the underlying logic operations on an IC. Practical attacks have been demonstrated using power supply traces and either plaintext or cipher-text collected during encryption operations. Also, several techniques that detect trojans rely on detecting anomalies in the power supply in combination with other circuit parameters. Countermeasures against these side-channel attacks as well as detection schemes for hardware trojans are required and rely on accurate pre-fabrication power consumption predictions. However, available state-of-the-art techniques would require prohibitive full-chip SPICE simulations. In this work, we present an optimized technique to accurately estimate the power supply signatures that require significantly less computational resources, thus enabling integration of Design-for-Security (DfS) based paradigms. To demonstrate the effectiveness of our technique, we present data for a DES crypto-system that proves that our framework can identify vulnerabilities to Differential Power Analysis (DPA) attacks. Our framework can be generically applied to other crypto-systems and can handle larger IC designs without loss of accuracy.
引用
收藏
页码:92 / 95
页数:4
相关论文
共 50 条
  • [41] Side-channel attack on Rainbow post-quantum signature
    Pokorny, David
    Socha, Petr
    Novotny, Martin
    PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 565 - 568
  • [42] Side-Channel Leakage Amount Estimation Based on Communication Theory
    Yang, Wei
    Zhang, Hailong
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [43] Breaching the Gap: Modelling SRAM-PUFs via Side-Channel Signatures
    Pratihar, Kuheli
    Chatterjee, Soumi
    Chakraborty, Rajat Subhra
    Mukhopadhyay, Debdeep
    PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, 2024, : 574 - 578
  • [44] PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance
    Arsath, Muhammad K. F.
    Ganesan, Vinod
    Bodduna, Rahul
    Rebeiro, Chester
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2020, : 23 - 34
  • [45] Remote Power Side-Channel Attacks on BNN Accelerators in FPGAs
    Moini, Shayan
    Tian, Shanquan
    Holcomb, Daniel
    Szefer, Jakub
    Tessier, Russell
    PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 1639 - 1644
  • [46] Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs
    Moini, Shayan
    Tian, Shanquan
    Holcomb, Daniel
    Szefer, Jakub
    Tessier, Russell
    IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2021, 11 (02) : 357 - 370
  • [47] Power attacks on a side-channel resistant elliptic curve implementation
    Geiselmann, W
    Steinwandt, R
    INFORMATION PROCESSING LETTERS, 2004, 91 (01) : 29 - 32
  • [48] Temporal Power Redistribution as a Countermeasure Against Side-Channel Attacks
    Zooker, David
    Elkoni, Matan
    Shalom, Or Ohev
    Weizman, Yoav
    Levi, Itamar
    Keren, Osnat
    Fish, Alexander
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [49] Comprehensive Side-Channel Power Analysis of XTS-AES
    Luo, Chao
    Fei, Yunsi
    Ding, Aidong Adam
    Closas, Pau
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2019, 38 (12) : 2191 - 2200
  • [50] Encoding Power Traces as Images for Efficient Side-Channel Analysis
    Hettwer, Benjamin
    Horn, Tobias
    Gehrer, Stefan
    Gueneysu, Tim
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2020, : 46 - 56