Mitigating EM Side-Channel Attacks with Dynamic Delay Insertion and Data Bus Inversion

被引:0
|
作者
Jiang, Minmin [1 ]
Maragkoudaki, Eleni [1 ]
Pavlidis, Vasilis F. [1 ,2 ]
机构
[1] Univ Manchester, Dept Comp Sci, Adv Processor Technol Grp, Manchester, Lancs, England
[2] Aristotle Univ Thessaloniki, Elect & Comp Engn Dept, Thessaloniki, Greece
关键词
Data Bus Inversion (DBI); interposer; coupling capacitance; electromagnetic emission; side-channel attack;
D O I
10.1109/ISCAS48785.2022.9937605
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cryptographic circuits are sensitive to electromagnetic (EM) side-channel attacks (SCAs), which aim to detect the EM emissions of these circuits. A novel technique is proposed to mitigate such attacks, by reducing the correlation between the processed data and EM emissions. This objective is achieved by combining energy-efficient data inversion with dynamic delay insertion. The added delay enhances the immunity against EM attacks for the cryptographic circuit without performance degradation and, in specific scenarios, even improves performance. Simulation results on a set of EM traces, captured from an 8-bit interposer-based off-chip memory bus, demonstrate the efficiency of the proposed technique by decreasing SNR below 1 and improving the worst-case bus latency by 9.5%.
引用
收藏
页码:1724 / 1728
页数:5
相关论文
共 50 条
  • [1] Performance-Aware Interconnect Delay Insertion Against EM Side-Channel Attacks
    Jiang, Minmin
    Pavlidis, Vasilis F.
    2021 ACM/IEEE INTERNATIONAL WORKSHOP ON SYSTEM-LEVEL INTERCONNECT PATHFINDING (SLIP 2021), 2021, : 25 - 32
  • [2] Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
    Wichelmann, Jan
    Paetschke, Anna
    Wilke, Luca
    Eisenbarth, Thomas
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6789 - 6806
  • [3] Security Network On-Chip for Mitigating Side-Channel Attacks
    Kenarangi, Farid
    Partin-Vaisband, Inna
    2019 ACM/IEEE INTERNATIONAL WORKSHOP ON SYSTEM LEVEL INTERCONNECT PREDICTION (SLIP), 2019,
  • [4] Energy Implications of Mitigating Side-Channel Attacks on Branch Prediction
    Alqurashi, Fahad
    AL-Hashimi, Mohammed
    Saleh, Mostafa
    Abulnaja, Osama
    COMPUTERS, 2025, 14 (02)
  • [5] BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect
    Rodrigues, Cristiano
    Oliveira, Daniel
    Pinto, Sandro
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 3679 - 3696
  • [6] A Compact Probe for EM Side-Channel Attacks on Cryptographic Systems
    Werner, Frank T.
    Djordjevic, Antonije R.
    Zajic, Alenka G.
    2019 IEEE INTERNATIONAL SYMPOSIUM ON ANTENNAS AND PROPAGATION AND USNC-URSI RADIO SCIENCE MEETING, 2019, : 613 - 614
  • [7] Leveraging EM Side-Channel Information to Detect Rowhammer Attacks
    Zhang, Zhenkai
    Zhan, Zihao
    Balasubramanian, Daniel
    Li, Bo
    Volgyesi, Peter
    Koutsoukos, Xenofon
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 729 - 746
  • [8] RIC: Relaxed Inclusion Caches for Mitigating LLC Side-Channel Attacks
    Kayaalp, Mehmet
    Khasawneh, Khaled N.
    Esfeden, Hodjat Asghari
    Elwell, Jesse
    Abu-Ghazaleh, Nael
    Ponomarev, Dmitry
    Jaleel, Aamer
    PROCEEDINGS OF THE 2017 54TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2017,
  • [9] Cloud Aid - A Cloud Computing Tool for Mitigating Side-Channel Attacks
    Gomes, Ricardo Bianchin
    Medina, Roseclea Duarte
    Moro, Fernando Gomes
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [10] Parasite: Mitigating Physical Side-Channel Attacks Against Neural Networks
    Chabanne, Herve
    Danger, Jean-Luc
    Guiga, Linda
    Kuhne, Ulrich
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2021, 2022, 13162 : 148 - 167