Mitigating EM Side-Channel Attacks with Dynamic Delay Insertion and Data Bus Inversion

被引:0
|
作者
Jiang, Minmin [1 ]
Maragkoudaki, Eleni [1 ]
Pavlidis, Vasilis F. [1 ,2 ]
机构
[1] Univ Manchester, Dept Comp Sci, Adv Processor Technol Grp, Manchester, Lancs, England
[2] Aristotle Univ Thessaloniki, Elect & Comp Engn Dept, Thessaloniki, Greece
关键词
Data Bus Inversion (DBI); interposer; coupling capacitance; electromagnetic emission; side-channel attack;
D O I
10.1109/ISCAS48785.2022.9937605
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cryptographic circuits are sensitive to electromagnetic (EM) side-channel attacks (SCAs), which aim to detect the EM emissions of these circuits. A novel technique is proposed to mitigate such attacks, by reducing the correlation between the processed data and EM emissions. This objective is achieved by combining energy-efficient data inversion with dynamic delay insertion. The added delay enhances the immunity against EM attacks for the cryptographic circuit without performance degradation and, in specific scenarios, even improves performance. Simulation results on a set of EM traces, captured from an 8-bit interposer-based off-chip memory bus, demonstrate the efficiency of the proposed technique by decreasing SNR below 1 and improving the worst-case bus latency by 9.5%.
引用
收藏
页码:1724 / 1728
页数:5
相关论文
共 50 条
  • [31] Implications of Noise Insertion Mechanisms of Different Countermeasures Against Side-Channel Attacks'
    Yu, Weize
    Kose, Selcuk
    2017 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2017,
  • [32] Side-Channel Attacks on Query-Based Data Anonymization
    Boenisch, Franziska
    Munz, Reinhard
    Tiepelt, Marcel
    Hanisch, Simon
    Kuhn, Christiane
    Francis, Paul
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 1254 - 1265
  • [33] Modeling The Side-Channel Attacks in Data Deduplication with Game Theory
    Wang, Bing
    Lou, Wenjing
    Hou, Y. Thomas
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 200 - 208
  • [34] An Asynchronous MPGA THx2 Cell and Architecture for Mitigating Side-Channel Attacks
    Emmert, John M.
    Perumalla, Anvesh
    PROCEEDINGS OF THE 2019 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2019, : 232 - 235
  • [35] DRM to Counter Side-Channel Attacks?
    Benadjila, Ryad
    Billet, Olivier
    Francfort, Stanislas
    DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT, 2007, : 23 - 32
  • [36] Codes for Side-Channel Attacks and Protections
    Guilley, Sylvain
    Heuser, Annelie
    Rioul, Olivier
    CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 35 - 55
  • [37] Side-Channel Attacks in a Real Scenario
    Ming Tang
    Maixing Luo
    Junfeng Zhou
    Zhen Yang
    Zhipeng Guo
    Fei Yan
    Liang Liu
    Tsinghua Science and Technology, 2018, 23 (05) : 586 - 598
  • [38] Synthesis of Adaptive Side-Channel Attacks
    Quoc-Sang Phan
    Bang, Lucas
    Pasareanu, Corina S.
    Malacaria, Pasquale
    Bultan, Tevfik
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 328 - 342
  • [39] Side-Channel Attacks in a Real Scenario
    Tang, Ming
    Luo, Maixing
    Zhou, Junfeng
    Yang, Zhen
    Guo, Zhipeng
    Yan, Fei
    Liu, Liang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 586 - 598
  • [40] An Asynchronous FPGA THx2 Programmable Cell for Mitigating Side-Channel Attacks
    Emmert, John M.
    Perumalla, Anvesh
    Concha, Luis
    2020 IEEE 63RD INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2020, : 840 - 843