Simulation models for side-channel information leaks

被引:0
|
作者
Tiri, K [1 ]
Verbauwhede, I [1 ]
机构
[1] Univ Calif Los Angeles, Dept Elect Engn, Los Angeles, CA 90024 USA
关键词
simulation model; countermeasure; side-channel attack; differential power analysis; encryption; smart card; security IC;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power consumption, execution time, electromagnetic radiation and other information that is leaked by the switching behavior of digital CMOS gates. Ever since power attacks have been introduced in 1999, many countermeasures have been proposed. Often a significant increase in security has been touted. We will show that in order to assess the effectiveness of a countermeasure, a correct simulation model of the side-channel information leaks is vital. We will show that seemingly correct approximations can lead to completely flawed results.
引用
收藏
页码:228 / 233
页数:6
相关论文
共 50 条
  • [1] A Monitoring Framework for Side-Channel Information Leaks
    Lescisin, Michael
    Mahmoud, Qusay H.
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2020, : 690 - 695
  • [2] Pinpointing side-channel information leaks in web applications
    Mather, Luke
    Oswald, Elisabeth
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (03) : 161 - 177
  • [3] A Machine Learning Based Monitoring Framework for Side-Channel Information Leaks
    Lescisin, Michael
    Mahmoud, Qusay H.
    [J]. IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2021, 2 : 139 - 151
  • [4] Layer Sequence Extraction of Optimized DNNs Using Side-Channel Information Leaks
    Sun, Yidan
    Jiang, Guiyuan
    Liu, Xinwang
    He, Peilan
    Lam, Siew-Kei
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (10) : 3102 - 3115
  • [5] Reverse Engineering Convolutional Neural Networks Through Side-channel Information Leaks
    Hua, Weizhe
    Zhang, Zhiru
    Suh, G. Edward
    [J]. 2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2018,
  • [6] Quantitative estimation of side-channel leaks with neural networks
    Saeid Tizpaz-Niari
    Pavol Černý
    Sriram Sankaranarayanan
    Ashutosh Trivedi
    [J]. International Journal on Software Tools for Technology Transfer, 2021, 23 : 641 - 654
  • [7] Quantification of side-channel information leaks based on data complexity measures for web browsing
    He, Zhi-Min
    Chan, Patrick P. K.
    Yeung, Daniel S.
    Pedrycz, Witold
    Ng, Wing W. Y.
    [J]. INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2015, 6 (04) : 607 - 619
  • [8] Quantification of side-channel information leaks based on data complexity measures for web browsing
    Zhi-Min He
    Patrick P. K. Chan
    Daniel S. Yeung
    Witold Pedrycz
    Wing W. Y. Ng
    [J]. International Journal of Machine Learning and Cybernetics, 2015, 6 : 607 - 619
  • [9] Quantitative estimation of side-channel leaks with neural networks
    Tizpaz-Niari, Saeid
    Cerny, Pavol
    Sankaranarayanan, Sriram
    Trivedi, Ashutosh
    [J]. INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2021, 23 (04) : 641 - 654
  • [10] Path Leaks of HTTPS Side-Channel by Cookie Injection
    Chen, Fuqing
    Duan, Haixin
    Zheng, Xiaofeng
    Jiang, Jian
    Chen, Jianjun
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2018, 2018, 10815 : 189 - 203