Side-channel Attacks on Memristive Circuits Under External Disturbances

被引:0
|
作者
Chen, Li-Wei [1 ]
Zhao, Xianyue [2 ]
Chen, Ziang [2 ]
Du, Nan [2 ]
Polian, Ilia [1 ]
机构
[1] Univ Stuttgart, Inst Comp Architecture & Comp Engn, Stuttgart, Germany
[2] Friedrich Schiller Univ Jena, Leibniz Inst Photon Technol IPHT, Inst Solid State Phys, Dept Quantum Detect, Jena, Germany
关键词
Memristors; Side-channel analysis; External disturbances; GENERATION; SWITCHES;
D O I
10.1109/ATS59501.2023.10317969
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Quick progress in memristive technologies has led to their consideration for several potential applications, many of which are security-critical. New possibilities of memristors, including their unique combination of non-volatile storage and compute capabilities, make them particularly attractive to edge applications, which are physically exposed to their users and therefore to potential attackers. Therefore, practical deployment of memristive circuitry for, e.g., cryptographic (sub-)modules or on-chip neural network inference, is only feasible when their vulnerability to physical attacks is understood and addressed. We evaluate experimentally one relevant class of physical attacks, namely side-channel attacks, under varying external conditions, namely temperature and magnetic fields. Using a small cryptographic construction, we evaluate both white-box and black-box attack varieties, using respective cryptanalytic techniques. Our results show that, while non-nominal conditions can complicate attacks, the information leakage remains and the secrets are extractable with additional knowledge about the memristive devices. This suggests the need to consider possible external disturbances during security evaluation.
引用
收藏
页码:171 / 176
页数:6
相关论文
共 50 条
  • [21] Side-Channel Attacks: A Short Tour
    Piessens, Frank
    van Oorschot, Paul C.
    Piessens, Frank
    van Oorshot, Paul C.
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 75 - 80
  • [22] Soft Analytical Side-Channel Attacks
    Veyrat-Charvillon, Nicolas
    Gerard, Benoit
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 282 - 296
  • [23] Cache Side-Channel Attacks and Defenses
    Zhang W.
    Bai L.
    Ling Y.
    Lan X.
    Jia X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [24] Secure Broadcasting of Two Encrypted Sources under Side-Channel Attacks
    Santoso, Bagus
    Oohama, Yasutada
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 305 - 309
  • [25] REDCAP: Reconfigurable RFET-based Circuits Against Power Side-Channel Attacks
    Kavand, Nima
    Darjani, Armin
    Galderisi, Giulio
    Trommert, Jens
    Mikolajick, Thomas
    Kumar, Akash
    2024 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2024,
  • [26] Side-Channel Leakage in SFQ Circuits and Related Attacks on Qubit Control and Readout Systems
    Mustafa, Yerzhan
    Kose, Selcuk
    IEEE TRANSACTIONS ON APPLIED SUPERCONDUCTIVITY, 2023, 33 (06)
  • [27] Modeling of Tamper Resistance to Electromagnetic Side-channel Attacks on Voltage-scaled Circuits
    Minamiguchi, Kazuki
    Midoh, Yoshihiro
    Miura, Noriyuki
    Shiomi, Jun
    29TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC 2024, 2024, : 618 - 624
  • [28] A gradient deconvolutional network for side-channel attacks
    Li, Yanbin
    Huang, Yuxin
    Jia, Fuwei
    Zhao, Qingsong
    Tang, Ming
    Ren, Shougang
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 98
  • [29] Remote Side-Channel Attacks on Anonymous Transactions
    Tramer, Florian
    Boneh, Dan
    Paterson, Kenneth G.
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 2739 - 2756
  • [30] Side-Channel Attacks on Mobile and Wearable Systems
    Nahapetian, Ani
    2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,