Checking Robustness Against EM Side-Channel Attacks Prior to Manufacturing

被引:9
|
作者
Poggi, Davide [1 ]
Ordas, Thomas [1 ]
Sarafianos, Alexandre [1 ]
Maurine, Philippe [2 ]
机构
[1] STMicroelectronics, SMD, F-13106 Rousset, France
[2] Univ Montpellier, LIRMM, F-34392 Montpellier, France
关键词
Wires; Integrated circuit modeling; Probes; Correlation; Robustness; Magnetic separation; Magnetic circuits; Electromagnetic analysis; leakage; side-channel analysis; simulation; POWER ANALYSIS;
D O I
10.1109/TCAD.2021.3092297
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Electromagnetic attacks, which in fact exploit essentially the magnetic field generated by ICs, are commonly used by adversaries to retrieve secret information manipulated by integrated circuits. Due to the increasing resolution and effectiveness of EM equipment used to perform these attacks, it is becoming increasingly difficult to design secure circuits robust enough to resist these attacks. The contribution of this article is threefold. First, it describes a simulation flow of the magnetic field radiated by ICs. The introduced flow is based on an industrial voltage drop tool: ANSYS RedHawk. Second, it introduces a methodology to localize the root cause of leakages in ICs as well as EM hotspots, i.e., positions above the IC surface, where an adversary can place its probe to capture secrets. The latter contribution is based on the concept of noise to add, which is introduced in this article in order to overcome the absence of noise in simulations (noise which is omnipresent in practice) that limits their interpretability. Finally, the article demonstrates the soundness of the proposed solution by confronting simulation results with measurements.
引用
收藏
页码:1264 / 1275
页数:12
相关论文
共 50 条
  • [1] Performance-Aware Interconnect Delay Insertion Against EM Side-Channel Attacks
    Jiang, Minmin
    Pavlidis, Vasilis F.
    2021 ACM/IEEE INTERNATIONAL WORKSHOP ON SYSTEM-LEVEL INTERCONNECT PATHFINDING (SLIP 2021), 2021, : 25 - 32
  • [2] On the Correctness of an Approach against Side-Channel Attacks
    Wang, Peng
    Feng, Dengguo
    Wu, Wenling
    Zhang, Liting
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 336 - +
  • [3] Acoustic Side-Channel Attacks on Additive Manufacturing Systems
    Al Faruque, Mohammad Abdullah
    Chhetri, Sujit Rokka
    Canedo, Arquimedes
    Wan, Jiang
    2016 ACM/IEEE 7TH INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS), 2016,
  • [4] A Compact Probe for EM Side-Channel Attacks on Cryptographic Systems
    Werner, Frank T.
    Djordjevic, Antonije R.
    Zajic, Alenka G.
    2019 IEEE INTERNATIONAL SYMPOSIUM ON ANTENNAS AND PROPAGATION AND USNC-URSI RADIO SCIENCE MEETING, 2019, : 613 - 614
  • [5] Leveraging EM Side-Channel Information to Detect Rowhammer Attacks
    Zhang, Zhenkai
    Zhan, Zihao
    Balasubramanian, Daniel
    Li, Bo
    Volgyesi, Peter
    Koutsoukos, Xenofon
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 729 - 746
  • [6] Whitenoise Encryption Implementation with Increased Robustness to Side-Channel Attacks
    Sima, Mihai
    Brisson, Andre
    2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [7] Practical Algebraic Side-Channel Attacks Against ACORN
    Adomnicai, Alexandre
    Masson, Laurent
    Fournier, Jacques J. A.
    INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 325 - 340
  • [8] A Memory Hierarchy Protected against Side-Channel Attacks
    Talaki, Ezinam Bertrand
    Savry, Olivier
    Bouvier Des Noes, Mathieu
    Hely, David
    CRYPTOGRAPHY, 2022, 6 (02)
  • [9] ISA Extensions of Shuffling Against Side-Channel Attacks
    Zhou, Jiayun
    Qin, Guofeng
    Li, Lu
    Guo, Chun
    Wang, Weijia
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (03) : 761 - 773
  • [10] Extractors against side-channel attacks: weak or strong?
    Medwed, Marcel
    Standaert, Francois-Xavier
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (03) : 231 - 241