Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2463209.2488830acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

Role of power grid in side channel attack and power-grid-aware secure design

Published: 29 May 2013 Publication History

Abstract

Side-channel attack (SCA) is a method in which an attacker aims at extracting secret information from crypto chips by analyzing physical parameters (e.g. power). SCA has emerged as a serious threat to many mathematically unbreakable cryptography systems. From an attacker's point of view, the difficulty of mounting SCA largely depends on Signal-to-Noise Ratio (SNR) of the side-channel information. It has been shown that SNR primarily depends on algorithmic and circuit-level implementation, measurement noise, as well as device thermal noise. However, to the best of our knowledge, there has not been any study on the effect of power delivery network (PDN) on SCA resistance. We note that the PDN plays a significant role in SNR of measured supply current. Furthermore, SCA resistance strongly depends on the operating frequency due to RLC structure of a power grid. In this paper, we analyze the effect of power grid on SCA and provide quantitative results to demonstrate the frequency-dependent SCA resistance due to PDN-induced noise. This property can potentially be exploited by an attacker to facilitate the attack by operating a device at favorable frequency points. On the other hand, from a designer's perspective, one can explore countermeasures to secure the device at all operating frequencies while minimizing the design overhead. Based on this observation, we propose a frequency-dependent noise-injection based compensation technique to efficiently protect against SCA. Simulation results using realistic PDN model as well as experimental measurements using FPGA test board validate the observations on role of PDN in SCA and the efficacy of the proposed compensation approach.

References

[1]
P. C. Kocher et al., "Differential Power Analysis," CRYPTO, 1999.
[2]
P. C. Kocher et al., "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," CRYPTO, 1996.
[3]
J. F. Dhem et al., "Practical Implementation of the Timing Attack," CARDIS, 1998.
[4]
W. V. Eck et al., "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk" Computers and Security, v. 4, 1985.
[5]
S. Guilley et al., "Differential Power Analysis Model and Some Results," CARDIS, 2004.
[6]
T. S. Messerges et al., "Investigations of Power Analysis Attacks on Smartcards," USENIX Workshop on Smartcard Technology, 1999.
[7]
F.-X. Standaert et al., "Power Analysis of an FPGA Implementation of Rijndael: Is Pipelining a DPA Countermeasure?" CHES, 2004.
[8]
Available Online: http://staff.aist.go.jp/akashi.satoh/SASEBO/en/index.html
[9]
Available Online: http://ptm.asu.edu/
[10]
E. Brier et al., "Correlation Power Analysis with a Leakage Model," CHES, 2004.
[11]
S. Mangard et al., "Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness," CT-RSA, 2004.
[12]
M. Saint-Laurent et al., "Impact of power-supply noise on timing in high-frequency microprocessors," IEEE Transactions on Advanced Packaging, Feb. 2004.
[13]
S. Mangard et al.,"Power Analysis Attacks- Revealing the Secrets of Smart Cards," Springer 2007.
[14]
K. Tanimura et al., "HDRL: Homogeneous Dual-Rail Logic for DPA Attack Resistive Secure Circuit Design," IEEE Embedded System Letters, Vol. 4, No. 3, Sep 2012.
[15]
Z. Chen et al., "Using Virtual Secure Circuit to Protect Embedded Software from Side-Channel Attacks," IEEE Transactions on Computers, 2011.
[16]
M. Joye et al., "On Second-Order Differential Power Analysis," CHES, 2005.
[17]
K. Tiri et al., "Side-Channel Attack Pitfalls," DAC, 2007.
[18]
M. S. Gupta et al., "Understanding Voltage Variations in Chip Multiprocessors using a Distributed Power-Delivery Network," DATE & Exhibition, 2007.
[19]
K. Tiri et al., "Simulation Models for Side-Channel Leaks," DAC, 2005.
[20]
T. S. Messerges et al., "Examining Smart-Card Security under the Threat of Power Analysis Attacks," IEEE transactions on Computers, 51(5), 2002.
[21]
A. Prabhakaran et al., "Side-Channel Analysis of Block Ciphers Using CERG-GMU Interface on SASEBO-GII," Master's Thesis, ECE Department, George Mason University, Fairfax, Virginia, USA, May 2011.
[22]
N. H. E. Weste et al., "CMOS VLSI Design - a Circuits and Systems Perspective," 4th edition, Addison-Wesley.
[23]
B. W. Garlepp et al., "A Portable Digital DLL for High-Speed CMOS Interface Circuits," IEEE Journal of Solid-State Circuits, Vol. 34, No. 5, May 1999.
[24]
Y. Moon et al., "An All-Analog Multiphase Delay-Locked Loop Using a Replica Delay Line for Wide-Range Operation and Low-Jitter Performance," IEEE Journal of Solid-State Circuits, Vol. 35, No. 3, March 2000.

Cited By

View all
  • (2024)On Modeling and Detecting Trojans in Instruction SetsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2024.338955843:10(3226-3239)Online publication date: Oct-2024
  • (2023)Securing AES Designs Against Power Analysis Attacks: A SurveyIEEE Internet of Things Journal10.1109/JIOT.2023.326568310:16(14332-14356)Online publication date: 15-Aug-2023
  • (2022)A Low-Power Authentication IC for Visible-Light-Based InterrogationIEEE Transactions on Industrial Electronics10.1109/TIE.2021.306396569:3(3120-3130)Online publication date: Mar-2022
  • Show More Cited By

Index Terms

  1. Role of power grid in side channel attack and power-grid-aware secure design

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      DAC '13: Proceedings of the 50th Annual Design Automation Conference
      May 2013
      1285 pages
      ISBN:9781450320719
      DOI:10.1145/2463209
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 29 May 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. DPA
      2. SCA resistance
      3. noise injection
      4. power delivery network
      5. side-channel attack (SCA)

      Qualifiers

      • Research-article

      Conference

      DAC '13
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

      Upcoming Conference

      DAC '25
      62nd ACM/IEEE Design Automation Conference
      June 22 - 26, 2025
      San Francisco , CA , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)22
      • Downloads (Last 6 weeks)3
      Reflects downloads up to 20 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)On Modeling and Detecting Trojans in Instruction SetsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2024.338955843:10(3226-3239)Online publication date: Oct-2024
      • (2023)Securing AES Designs Against Power Analysis Attacks: A SurveyIEEE Internet of Things Journal10.1109/JIOT.2023.326568310:16(14332-14356)Online publication date: 15-Aug-2023
      • (2022)A Low-Power Authentication IC for Visible-Light-Based InterrogationIEEE Transactions on Industrial Electronics10.1109/TIE.2021.306396569:3(3120-3130)Online publication date: Mar-2022
      • (2022)A Comprehensive Evaluation of Integrated Circuits Side-Channel Resilience Utilizing Three-Independent-Gate Silicon Nanowire Field Effect Transistors-Based Current Mode LogicIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2021.312836441:10(3228-3238)Online publication date: Oct-2022
      • (2022)Unsupervised Identification of Electrical Loads from Aggregate Power Measurements2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)10.1109/ISGT50606.2022.9817487(1-6)Online publication date: 24-Apr-2022
      • (2021)A novel SCA-resilience flip-flop design utilizing the current mode logic based on the three-independent-gate field effect transistorsIEICE Electronics Express10.1587/elex.18.20210248Online publication date: 2021
      • (2021)An Overview of Hardware Security and Trust: Threats, Countermeasures, and Design ToolsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2020.304797640:6(1010-1038)Online publication date: Jun-2021
      • (2021)Security-Driven Placement and Routing Tools for Electromagnetic Side-Channel ProtectionIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2020.302493840:6(1077-1089)Online publication date: Jun-2021
      • (2021)Automatic On-Chip Clock Network Optimization for Electromagnetic Side-Channel ProtectionIEEE Journal on Emerging and Selected Topics in Circuits and Systems10.1109/JETCAS.2021.307784211:2(371-382)Online publication date: Jun-2021
      • (2021)A Survey of Recent Attacks and Mitigation on FPGA Systems2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)10.1109/ISVLSI51109.2021.00059(284-289)Online publication date: Jul-2021
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media