Side-channel Attacks on Memristive Circuits Under External Disturbances

被引:0
|
作者
Chen, Li-Wei [1 ]
Zhao, Xianyue [2 ]
Chen, Ziang [2 ]
Du, Nan [2 ]
Polian, Ilia [1 ]
机构
[1] Univ Stuttgart, Inst Comp Architecture & Comp Engn, Stuttgart, Germany
[2] Friedrich Schiller Univ Jena, Leibniz Inst Photon Technol IPHT, Inst Solid State Phys, Dept Quantum Detect, Jena, Germany
关键词
Memristors; Side-channel analysis; External disturbances; GENERATION; SWITCHES;
D O I
10.1109/ATS59501.2023.10317969
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Quick progress in memristive technologies has led to their consideration for several potential applications, many of which are security-critical. New possibilities of memristors, including their unique combination of non-volatile storage and compute capabilities, make them particularly attractive to edge applications, which are physically exposed to their users and therefore to potential attackers. Therefore, practical deployment of memristive circuitry for, e.g., cryptographic (sub-)modules or on-chip neural network inference, is only feasible when their vulnerability to physical attacks is understood and addressed. We evaluate experimentally one relevant class of physical attacks, namely side-channel attacks, under varying external conditions, namely temperature and magnetic fields. Using a small cryptographic construction, we evaluate both white-box and black-box attack varieties, using respective cryptanalytic techniques. Our results show that, while non-nominal conditions can complicate attacks, the information leakage remains and the secrets are extractable with additional knowledge about the memristive devices. This suggests the need to consider possible external disturbances during security evaluation.
引用
收藏
页码:171 / 176
页数:6
相关论文
共 50 条
  • [1] On Side-Channel Analysis of Memristive Cryptographic Circuits
    Chen, Li-Wei
    Chen, Ziang
    Schindler, Werner
    Zhao, Xianyue
    Schmidt, Heidemarie
    Du, Nan
    Polian, Ilia
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 463 - 476
  • [2] Thwarting Side-Channel Attacks
    Edwards, Chris
    COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 13 - 14
  • [3] Combined Side-Channel Attacks
    Elaabid, M. Abdelaziz
    Meynard, Olivier
    Guilley, Sylvain
    Danger, Jean-Luc
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 175 - 190
  • [4] Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks
    Bhasin, Shivam
    Guilley, Sylvain
    Sauvage, Laurent
    Danger, Jean-Luc
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 195 - 207
  • [5] Side-channel attacks on smartcards
    NGS Software
    Netw. Secur., 2006, 12 (18-20):
  • [6] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [7] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [8] A Data Augmentation Method for Side-Channel Attacks on Cryptographic Integrated Circuits
    Cui, Xiaotong
    Zhang, Hongxin
    Xu, Jun
    Fang, Xing
    Ning, Wenxu
    Wang, Yuanzhen
    Hosen, Md Sabbir
    ELECTRONICS, 2024, 13 (07)
  • [9] Circuits and design techniques for secure ICs resistant to side-channel attacks
    Verbauwhede, I.
    Tiri, K.
    Hwang, D.
    Schaumont, P.
    2006 IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUIT DESIGN AND TECHNOLOGY, PROCEEDINGS, 2006, : 57 - +
  • [10] Introduction to Side-Channel Attacks and Fault Attacks
    Li, Yang
    Chen, Mengting
    Wang, Jian
    2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, : 573 - 575