Mitigating EM Side-Channel Attacks with Dynamic Delay Insertion and Data Bus Inversion

被引:0
|
作者
Jiang, Minmin [1 ]
Maragkoudaki, Eleni [1 ]
Pavlidis, Vasilis F. [1 ,2 ]
机构
[1] Univ Manchester, Dept Comp Sci, Adv Processor Technol Grp, Manchester, Lancs, England
[2] Aristotle Univ Thessaloniki, Elect & Comp Engn Dept, Thessaloniki, Greece
关键词
Data Bus Inversion (DBI); interposer; coupling capacitance; electromagnetic emission; side-channel attack;
D O I
10.1109/ISCAS48785.2022.9937605
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cryptographic circuits are sensitive to electromagnetic (EM) side-channel attacks (SCAs), which aim to detect the EM emissions of these circuits. A novel technique is proposed to mitigate such attacks, by reducing the correlation between the processed data and EM emissions. This objective is achieved by combining energy-efficient data inversion with dynamic delay insertion. The added delay enhances the immunity against EM attacks for the cryptographic circuit without performance degradation and, in specific scenarios, even improves performance. Simulation results on a set of EM traces, captured from an 8-bit interposer-based off-chip memory bus, demonstrate the efficiency of the proposed technique by decreasing SNR below 1 and improving the worst-case bus latency by 9.5%.
引用
收藏
页码:1724 / 1728
页数:5
相关论文
共 50 条
  • [21] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [22] CONDENSE: A Moving Target Defense Approach for Mitigating Cache Side-Channel Attacks
    Dai, Chenxi
    Adegbija, Tosiron
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2020, 9 (03) : 114 - 119
  • [23] Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks
    Chabanne, Herve
    Danger, Jean-Luc
    Guiga, Linda
    Kuhne, Ulrich
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2021), PT I, 2021, 12726 : 363 - 392
  • [24] Mitigating Timing-Based NoC Side-Channel Attacks With LLC Remapping
    Kar, Anurag
    Liu, Xueyang
    Kim, Yonghae
    Saileshwar, Gururaj
    Kim, Hyesoon
    Krishna, Tushar
    IEEE COMPUTER ARCHITECTURE LETTERS, 2023, 22 (01) : 53 - 56
  • [25] Mutexion: Mutually Exclusive Compression System for Mitigating Compression Side-Channel Attacks
    Moon, Taegeun
    Kim, Hyoungshick
    Hyun, Sangwon
    ACM TRANSACTIONS ON THE WEB, 2022, 16 (04)
  • [26] Implications of Distributed On-Chip Power Delivery on EM Side-Channel Attacks
    Khan, Ahmed Waheed
    Wanchoo, Tanya
    Mumcu, Gokhan
    Kose, Selcuk
    2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2017, : 329 - 336
  • [27] A Systematic Evaluation of EM and Power Side-Channel Analysis Attacks on AES Implementations
    Iyer, Vishnuvardhan
    Wang, Meizhi
    Kulkarni, Jaydeep
    Yilmaz, Ali E.
    2021 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2021, : 46 - 51
  • [28] SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip
    Longo, J.
    De Mulder, E.
    Page, D.
    Tunstall, M.
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 620 - 640
  • [29] Introduction to Side-Channel Attacks and Fault Attacks
    Li, Yang
    Chen, Mengting
    Wang, Jian
    2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, : 573 - 575
  • [30] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414