Screaming channels: When electromagnetic side channels meet radio transceivers

G Camurati, S Poeplau, M Muench, T Hayes… - Proceedings of the …, 2018 - dl.acm.org
This paper presents a new side channel that affects mixed-signal chips used in widespread
wireless communication protocols, such as Bluetooth and WiFi. This increasingly common …

An overview of side channel analysis attacks

TH Le, C Canovas, J Clédiere - … of the 2008 ACM symposium on …, 2008 - dl.acm.org
During the last ten years, power analysis attacks have been widely developed under many
forms. They analyze the relation between the power consumption or electromagnetic …

Efficient simulation of EM side-channel attack resilience

A Kumar, C Scarborough, A Yilmaz… - 2017 IEEE/ACM …, 2017 - ieeexplore.ieee.org
Electromagnetic (EM) fields emanated during crypto-operations are an effective non-
invasive channel for extracting secret keys. To predict vulnerabilities and improve resilience …

[PDF][PDF] EM Side Channels in Hardware Security: Attacks and Defenses.

J He, X Guo, MM Tehranipoor, A Vassilev… - IEEE Des …, 2022 - ieeexplore.ieee.org
Side channel analysis (SCA) imposes a severe security threat to circuit implementations,
especially to cryptographic hardware. Among all side channel parameters, electromagnetic …

Side-channel attack pitfalls

K Tiri - Proceedings of the 44th annual Design Automation …, 2007 - dl.acm.org
While cryptographic algorithms are usually strong against mathematical attacks, their
practical implementation, both in software and in hardware, opens the door to side-channel …

Information theoretic evaluation of side-channel resistant logic styles

F Macé, FX Standaert, JJ Quisquater - Cryptographic Hardware and …, 2007 - Springer
We propose to apply an information theoretic metric to the evaluation of side-channel
resistant logic styles. Due to the long design and development time required for the physical …

Charge-sharing symmetric adiabatic logic in countermeasure against power analysis attacks at cell level

C Monteiro, Y Takahashi, T Sekine - Microelectronics Journal, 2013 - Elsevier
Side-channel attacks by cryptanalysis are becoming a serious threat for cryptographers, who
are designing systems that are more robust in terms of hardware and algorithm threats …

EMSim: A Fast Layout Level Electromagnetic Emanation Simulation Framework for High Accuracy Pre-Silicon Verification

H Ma, M Panoff, J He, Y Zhao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Electromagnetic (EM) emanation measurement and evaluation is one important testing for
modern integrated circuits (ICs). Severe electromagnetic interference may degrade the …

Using optical emission analysis for estimating contribution to power analysis

S Skorobogatov - 2009 Workshop on Fault Diagnosis and …, 2009 - ieeexplore.ieee.org
This paper shows that optical emissions from an operating chip have a good correlation with
power traces and can therefore be used to estimate the contribution of different areas within …

Design automation of real-life asynchronous devices and systems

A Taubin, J Cortadella, L Lavagno… - … and Trends® in …, 2007 - nowpublishers.com
The number of gates on a chip is quickly growing toward and beyond the one billion mark.
Keeping all the gates running at the beat of a single or a few rationally related clocks is …