Hardware Security: Physical Design versus Side-channel and Fault Attacks

被引:0
|
作者
Verbauwhede, Ingrid [1 ]
机构
[1] Katholieke Univ Leuven, COSIC, Leuven, Belgium
关键词
Hardware security; cryptography; side-channel attacks; fault attacks; physical design;
D O I
10.1145/3505170.3513089
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
What is "hardware" security? How can we improve trustworthiness in hardware circuits? Is there a design method for secure hardware design? To answer these questions, different communities have different expectations of trusted (expecting trustworthy) hardware components upon which they start to build a secure system. At the same time, electronics shrink: sensor nodes, IOT devices, smart electronics are becoming more and more available. In the past, adding security was only a concern for locked server rooms or now cloud servers. However, these days, our portable devices contain highly private and secure information. Adding security and cryptography to these often very resource constraint devices is a challenge. Moreover, they can be subject to physical attacks, including sidechannel and fault attacks [1][2]. This presentation aims at bringing some order in the chaos of expectations by introducing the importance of a design methodology for secure design [3][5]. We will illustrate the capabilities of current side EM and laser fault passive and active attacks. In this context, we will also reflect on the role of physical design, place and route [4][6].
引用
收藏
页码:219 / 219
页数:1
相关论文
共 50 条
  • [21] Design of a Set of Software Tools for Side-Channel Attacks
    Fuentes, A.
    Hernandez, L.
    Martin, A.
    Alarcos, B.
    IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (06) : 1966 - 1978
  • [22] Thwarting Side-Channel Attacks
    Edwards, Chris
    COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 13 - 14
  • [23] Combined Side-Channel Attacks
    Elaabid, M. Abdelaziz
    Meynard, Olivier
    Guilley, Sylvain
    Danger, Jean-Luc
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 175 - 190
  • [24] Side-channel attacks on smartcards
    NGS Software
    Netw. Secur., 2006, 12 (18-20):
  • [25] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [26] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [27] Physical Design Strategies for Mitigating Fine-Grained Electromagnetic Side-Channel Attacks
    Wang, Meizhi
    Iyer, Vishnuvardhan V.
    Xie, Shanshan
    Li, Ge
    Mathew, Sanu K.
    Kumar, Raghavan
    Orshansky, Michael
    Yilmaz, Ali E.
    Kulkarni, Jaydeep P.
    2021 IEEE CUSTOM INTEGRATED CIRCUITS CONFERENCE (CICC), 2021,
  • [28] Side-Channel Hybrid Attacks on Strong Physical Unclonable Function
    Liu W.
    Jiang L.-H.
    Chang R.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2019, 47 (12): : 2639 - 2646
  • [29] Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption
    Unterluggauer, Thomas
    Mangard, Stefan
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2016, 2016, 9689 : 3 - 18
  • [30] Physical Side-Channel Attacks and Covert Communication on FPGAs: A Survey
    Mirzargar, Seyedeh Sharareh
    Stojilovic, Mirjana
    2019 29TH INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), 2019, : 202 - 210