Towards efficient and automated side-channel evaluations at design time

被引:18
|
作者
Sijacic, Danilo [1 ]
Balasch, Josep [1 ]
Yang, Bohan [1 ]
Ghosh, Santosh [2 ]
Verbauwhede, Ingrid [1 ]
机构
[1] Katholieke Univ Leuven, COSIC, IMEC, Leuven, Belgium
[2] Intel Corp, Intel Labs, Hillsboro, OR USA
基金
欧盟地平线“2020”;
关键词
Side-channel analysis; ASIC; Hardware simulation; Design time methodology; POWER ANALYSIS; LEAKAGE; FLOW;
D O I
10.1007/s13389-020-00233-8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Models and tools developed by the semiconductor community have matured over decades of use. As a result, hardware simulations can yield highly accurate and easily automated pre-silicon estimates for, e.g., timing and area figures. In this work, we design, implement, and evaluate CASCADE, a framework that combines a largely automated full-stack standard cell design flow with the state-of-the-art techniques for side-channel analysis. We show how it can be used to efficiently evaluate side-channel leakage prior to chip manufacturing. Moreover, it is independent of the underlying countermeasure and it can be applied starting from the earliest stages of the design flow. Additionally, we provide experimental validation through assessment of the side-channel security of representative cryptographic circuits. We discuss aspects related to the performance, scalability, and utility to the designers. In particular, we show that CASCADE can evaluate information leakage with 1 million simulated traces in less than 4 h using a single desktop workstation, for a design larger than 100 kGE.
引用
收藏
页码:305 / 319
页数:15
相关论文
共 50 条
  • [21] Side-channel countermeasures’ dissection and the limits of closed source security evaluations
    Bronchain O.
    Standaert F.-X.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (02): : 1 - 25
  • [22] Profiled Side-Channel Analysis in the Efficient Attacker Framework
    Picek, Stjepan
    Heuser, Annelie
    Perin, Guilherme
    Guilley, Sylvain
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2021), 2022, 13173 : 44 - 63
  • [23] Masking Dilithium Efficient Implementation and Side-Channel Evaluation
    Migliore, Vincent
    Gerard, Benoit
    Tibouchi, Mehdi
    Fouque, Pierre-Alain
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 344 - 362
  • [24] AutoPOI: automated points of interest selection for side-channel analysis
    Remmerswaal, Mick G. D.
    Wu, Lichao
    Tiran, Sebastien
    Mentens, Nele
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2024, 14 (03) : 463 - 474
  • [25] Timing Side-Channel Mitigation via Automated Program Repair
    Ruan, Haifeng
    Noller, Yannic
    Tizpaz-Niari, Saeid
    Chattopadhyay, Sudipta
    Roychoudhury, Abhik
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2024, 33 (08)
  • [26] An Efficient Method against Side-Channel Attacks on ECC
    LIU Shuanggen~ 1
    2. College of Computer Information Engineering
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1573 - 1576
  • [27] An Efficient Soft Analytical Side-Channel Attack on Ascon
    Luo, Sinian
    Wu, Weibin
    Li, Yanbin
    Zhang, Ruyun
    Liu, Zhe
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 389 - 400
  • [28] Automated Formal Analysis of Side-Channel Attacks on Probabilistic Systems
    Novakovic, Chris
    Parker, David
    COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 319 - 337
  • [29] Efficient Simulation of EM Side-Channel Attack Resilience
    Kumar, Amit
    Scarborough, Cody
    Yilmaz, Ali
    Orshansky, Michael
    2017 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2017, : 123 - 130
  • [30] Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
    Medwed, Marcel
    Standaert, Francois-Xavier
    Joux, Antoine
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 193 - 212