Side-Channel Attacks on Triple Modular Redundancy Schemes

被引:0
|
作者
Almeida, Felipe [1 ]
Aksoy, Levent [1 ]
Raik, Jaan [1 ]
Pagliarini, Samuel [1 ]
机构
[1] Tallinn Univ Technol, Dept Comp Syst, Tallinn, Estonia
关键词
triple modular redundancy; side-channel attacks; advanced encryption standard;
D O I
10.1109/ATS52891.2021.00026
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Triple Modular Redundancy (TMR) is a well-known fault tolerance technique for avoiding errors in the Integrated Circuits (ICs) and it has been used in a wide range of applications. The TMR technique employs three instances of circuits realizing concurrently the same functionality whose outputs are compared through a majority voter. On the other hand, SideChannel Attacks (SCAs) are powerful techniques to extract secret information from ICs based on the data collected from security critical operations. Over the years, the interplay between security and reliability is poorly studied. In this paper, we explore the performance of SCAs on the well-known Advanced Encryption Standard (AES) and its different realizations using the TMR technique. In this work, three implementations of the AES design under the TMR scheme are used and an SCA, which can collect power dissipation data from the physical netlist through simulations, is developed. The experimental results show that the TMR technique can increase the computation time of SCAs and more importantly, the use of functionally equivalent, but physically and structurally different instances in the TMR scheme can make it impossible for SCAs to discover the secret key.
引用
收藏
页码:79 / 84
页数:6
相关论文
共 50 条
  • [41] Cache Side-Channel Attacks in Cloud Computing
    Younis, Younis
    Kifayat, Kashif
    Merabti, Madjid
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 138 - 146
  • [42] On the Challenges of Detecting Side-Channel Attacks in SGX
    Jiang, Jianyu
    Soriente, Claudio
    Karame, Ghassan
    [J]. PROCEEDINGS OF 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2022, 2022, : 86 - 98
  • [43] Remote Side-Channel Attacks on Heterogeneous SoC
    Gravellier, Joseph
    Dutertre, Jean-Max
    Teglia, Yannick
    Moundi, Philippe Loubet
    Olivier, Francis
    [J]. SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 : 109 - 125
  • [44] Beyond the CPU: Side-Channel Attacks on GPUs
    Naghibijouybari, Hoda
    Neupane, Ajaya
    Qian, Zhiyun
    Abu-Ghazaleh, Nael
    [J]. IEEE DESIGN & TEST, 2021, 38 (03) : 15 - 21
  • [45] SonarSnoop: active acoustic side-channel attacks
    Peng Cheng
    Ibrahim Ethem Bagci
    Utz Roedig
    Jeff Yan
    [J]. International Journal of Information Security, 2020, 19 : 213 - 228
  • [46] Side-Channel Attacks on Optane Persistent Memory
    Liu, Sihang
    Kanniwadi, Suraaj
    Schwarzl, Martin
    Kogler, Andreas
    Gruss, Daniel
    Khan, Samira
    [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6807 - 6824
  • [47] Side-Channel Attacks Based on Collaborative Learning
    Liu, Biao
    Ding, Zhao
    Pan, Yang
    Li, Jiali
    Feng, Huamin
    [J]. DATA SCIENCE, PT 1, 2017, 727 : 549 - 557
  • [48] Side-Channel Attacks Detection Methods: A Survey
    Assaeedi, Joanna
    Alsuwat, Hatim
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 288 - 296
  • [49] A Modular and Optimized Toolbox for side-Channel Analysis
    Fuentes Rodriguez, Alberto
    Hernandez Encinas, Luis
    Martin Munoz, Agustin
    Alarcos Alcazar, Bernardo
    [J]. IEEE ACCESS, 2019, 7 : 21889 - 21903
  • [50] Entropy-Shield:Side-Channel Entropy Maximization for Timing-based Side-Channel Attacks
    Dhavlle, Abhijitt
    Mehta, Raj
    Rafatirad, Setareh
    Homayoun, Houman
    Dinakarrao, Sai Manoj Pudukotai
    [J]. PROCEEDINGS OF THE TWENTYFIRST INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2020), 2020, : 161 - 166