A New Power Analysis Attack and a Countermeasure in Embedded Systems

被引:0
|
作者
Chai, Fangming [1 ]
Kang, Kyoung-Don [1 ]
机构
[1] SUNY Binghamton, Dept Comp Sci, Binghamton, NY 13902 USA
关键词
Embedded Systems; Security; DVFS; Power Analysis Attack; Countermeasure;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent works on embedded system security, which is becoming increasingly important, claim that dynamic voltage and frequency scaling (DVFS) supports a natural defense against power analysis attacks. In this paper, however, we design a new DVFS-aware attack that 1) identifies the voltage and frequency values used for DVFS and 2) performs power analysis to extract cryptographic keys. Further, we propose a simple yet effective defense against DVFS-aware power analysis attacks: we generate noise against power analysis attacks by running random cryptographic instructions in slack time (if any) generated when a real-time task (e.g., an engine control task) finishes earlier than its worst-case execution time. To analyze the effectiveness of the new proposed attack and defense technique, we undertake a simulation study using a cycle-accurate micro-architectural simulator and an advanced power model. In the simulation study, our DVFS-aware power analysis attack increases the accuracy of secret key extraction by 1-22% compared to most existing power analysis attacks unaware of DVFS. Moreover, our defense policy decreases the success rate of the DVFS-aware power analysis attack by 2-22% compared to state-of-the-art approaches that use DVFS as a countermeasure against power analysis attacks.
引用
收藏
页码:645 / 652
页数:8
相关论文
共 50 条
  • [1] Securing Embedded Systems from Power Analysis Attack
    Rani, Deevi Radha
    Venkateswarlu, S.
    Mandhala, Venkata Naresh
    Kim, Tai-hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (06): : 11 - 18
  • [2] Correlation Power Analysis on KASUMI: Attack and Countermeasure
    Gupta, Devansh
    Tripathy, Somanath
    Mazumdar, Bodhisatwa
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2018, 2018, 11348 : 142 - 156
  • [3] Countermeasure of TWINE against Power Analysis Attack
    Nozaki, Yusuke
    Asahi, Kensaku
    Yoshikawa, Masaya
    2015 IEEE INTERNATIONAL MEETING FOR FUTURE OF ELECTRON DEVICES, KANSAI (IMFEDK), 2015,
  • [4] Implementation of a decoupling based power analysis attack countermeasure
    Mayhew, Matthew
    Muresan, Radu
    IET CIRCUITS DEVICES & SYSTEMS, 2016, 10 (06) : 528 - 535
  • [5] A Power Analysis Attack Countermeasure Based on Random Execution
    Chen, Shenghua
    Ge, Wei
    Yang, Jinjiang
    Liu, Bo
    Yang, Jun
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1474 - 1479
  • [6] Leakage Power Analysis (LPA) Attack in Breakdown Mode and Countermeasure
    Yu, Weize
    Wen, Yiming
    2018 31ST IEEE INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE (SOCC), 2018, : 102 - 105
  • [7] An Efficient Hardware Countermeasure against Differential Power Analysis Attack
    Choudhury, Amlan Jyoti
    Park, Beum Su
    Bruce, Ndibanje
    Lee, Young Sil
    Lim, Hyotaek
    Lee, Hoon Jae
    CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, 2011, 206 : 153 - +
  • [8] Countermeasure against the SPA Attack on an Embedded McEliece Cryptosystem
    Petrvalsky, Martin
    Richmond, Tania
    Drutarovsky, Milos
    Cayrel, Pierre-Louis
    Fischer, Viktor
    2015 25TH INTERNATIONAL CONFERENCE RADIOELEKTRONIKA (RADIOELEKTRONIKA), 2015, : 462 - 466
  • [9] CALPAN: Countermeasure against Leakage Power Analysis Attack by Normalized DDPL
    Padmini, C.
    Ravindra, J. V. R.
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [10] Proposal of PingPong-128 Countermeasure against Power Analysis Attack
    Kang, Young-Jin
    Kim, Ki-Hwan
    Lee, Hoon Jae
    2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 431 - 434