A Pre-Silicon Power Leakage Assessment Based on Generative Adversarial Networks

被引:0
|
作者
Aljuffri, Abdullah [1 ]
Saxena, Mudit [1 ]
Reinbrecht, Cezar [1 ]
Hamdioui, Said [1 ]
Taouil, Mottaqiallah [1 ]
机构
[1] Delft Univ Technol, Dept Comp Engn, EEMCS Fac, Delft, Netherlands
关键词
Countermeasures; design exploration; generative adversarial networks; side channel analysis; symmetric cryptography;
D O I
10.1109/DSD60849.2023.00022
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security is one of the most important features that a system must provide. Depending on the application of the target device, different threats should be considered at design time. However, the attack space is vast. Hence, it is difficult to decide what components to protect, what level of protection they require and how efficient they are in the field. This paper tries to close this validation gap for power based side channel attacks by providing a fast and reliable leakage assessment at design time that can be used to perform design space exploration for security. To accomplish our goal, we use Generative Adversarial Networks (GAN) to generate reliable power traces for hardware implementations at design time that are subsequently used to assess the leakage of the design. As a case study, we validated our framework against three AES implementations (i.e., unprotected, masked-protected, and balanced protected). In comparison to CAD-based scenarios, our findings show that the GAN model creates extremely reliable power traces in terms of attackability and leakage assessment. In addition, it is approximately 120 times quicker than CAD tools with respect to trace generation.
引用
收藏
页码:87 / 94
页数:8
相关论文
共 50 条
  • [1] Improving Side-channel Leakage Assessment Using Pre-silicon Leakage Models
    Shanmugam, Dillibabu
    Schaumont, Patrick
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2023, 2023, 13979 : 105 - 124
  • [2] An approach for pre-silicon power modeling
    Agrawal, Prashant
    Srinivasa, R. S. T. G.
    Oke, Ajit N.
    Vijay, Saurabh
    ICCTA 2007: INTERNATIONAL CONFERENCE ON COMPUTING: THEORY AND APPLICATIONS, PROCEEDINGS, 2007, : 99 - +
  • [3] Leverage the Average: Averaged Sampling in Pre-Silicon Side-Channel Leakage Assessment
    Kiaei, Pantea
    Liu, Zhenyuan
    Schaumont, Patrick
    PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 3 - 8
  • [4] Count Your Toggles: a New Leakage Model for Pre-Silicon Power Analysis of Crypto Designs
    Sadhukhan, Rajat
    Mathew, Paulson
    Roy, Debapriya Basu
    Mukhopadhyay, Debdeep
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2019, 35 (05): : 605 - 619
  • [5] Count Your Toggles: a New Leakage Model for Pre-Silicon Power Analysis of Crypto Designs
    Rajat Sadhukhan
    Paulson Mathew
    Debapriya Basu Roy
    Debdeep Mukhopadhyay
    Journal of Electronic Testing, 2019, 35 : 605 - 619
  • [6] Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel Leakage Location
    Li, Yanbin
    Zhu, Jiajie
    Liu, Zhe
    Tang, Ming
    Ren, Shougang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2340 - 2355
  • [7] Nonvolatile Memory Pre-Silicon Power Loss Test Using FPGA
    Hasan, Qamrul
    Ise, Yuichi
    Okada, Shinsuke
    Pan Lijun
    2018 14TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2018, : 1294 - 1296
  • [8] Security Properties Driven Pre-Silicon Laser Fault Injection Assessment
    Pundir, Nitin
    Li, Henian
    Lin, Lang
    Chang, Norman
    Farahmandi, Farimah
    Tehranipoor, Mark
    2022 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2022, : 9 - 12
  • [9] PacGAN: The power of two samples in generative adversarial networks
    Lin, Zinan
    Khetan, Ashish
    Fanti, Giulia
    Oh, Sewoong
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 31 (NIPS 2018), 2018, 31
  • [10] PacGan: The power of two samples in generative adversarial networks
    Lin Z.
    Khetan A.
    Fanti G.
    Oh S.
    IEEE Journal on Selected Areas in Information Theory, 2020, 1 (01): : 324 - 335