Hardware security exploiting post-CMOS devices: fundamental device characteristics, state-of-the-art countermeasures, challenges and roadmap
Emerging nanoelectronic semiconductor devices have been quite promising in enhancing
hardware-oriented security and trust. However, implementing hardware security primitives …
hardware-oriented security and trust. However, implementing hardware security primitives …
STELLAR: A generic EM side-channel attack protection through ground-up root-cause analysis
The threat of side-channels is becoming increasingly prominent for resource-constrained
internet-connected devices. While numerous power side-channel countermeasures have …
internet-connected devices. While numerous power side-channel countermeasures have …
[PDF][PDF] EM Side Channels in Hardware Security: Attacks and Defenses.
Side channel analysis (SCA) imposes a severe security threat to circuit implementations,
especially to cryptographic hardware. Among all side channel parameters, electromagnetic …
especially to cryptographic hardware. Among all side channel parameters, electromagnetic …
Architecture correlation analysis (ACA): Identifying the source of side-channel leakage at gate-level
Power-based side-channel leakage is a known problem in the design of security-centric
electronic systems. As the complexity of modern systems rapidly increases through the use …
electronic systems. As the complexity of modern systems rapidly increases through the use …
Multiphysics simulation of em side-channels from silicon backside with ml-based auto-poi identification
The silicon substrate backside of modern ICs is increasingly recognized as a critical
hardware vulnerability, which opens a backdoor for laser/optical probing, fault injection and …
hardware vulnerability, which opens a backdoor for laser/optical probing, fault injection and …
A fast side-channel leakage simulation technique based on IC chip power modeling
A Tsukioka, K Srinivasan, S Wan, L Lin… - IEEE Letters on …, 2019 - ieeexplore.ieee.org
Hardware-based secure integrated circuit (IC) chips with implemented cryptographic
algorithms are vulnerable to practical attacks analyzing side-channel (SC) leakage such as …
algorithms are vulnerable to practical attacks analyzing side-channel (SC) leakage such as …
Checking robustness against EM side-channel attacks prior to manufacturing
D Poggi, T Ordas, A Sarafianos… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Electromagnetic attacks, which in fact exploit essentially the magnetic field generated by ICs,
are commonly used by adversaries to retrieve secret information manipulated by integrated …
are commonly used by adversaries to retrieve secret information manipulated by integrated …
EMSim: A Fast Layout Level Electromagnetic Emanation Simulation Framework for High Accuracy Pre-Silicon Verification
Electromagnetic (EM) emanation measurement and evaluation is one important testing for
modern integrated circuits (ICs). Severe electromagnetic interference may degrade the …
modern integrated circuits (ICs). Severe electromagnetic interference may degrade the …
Systematic Literature Review of EM-SCA Attacks on Encryption
Cryptography is vital for data security, but cryptographic algorithms can still be vulnerable to
side-channel attacks (SCAs), physical assaults exploiting power consumption and EM …
side-channel attacks (SCAs), physical assaults exploiting power consumption and EM …
Security-driven placement and routing tools for electromagnetic side-channel protection
Side-channel analysis (SCA) attacks are major threats to hardware security. Upon this
security threat, various countermeasures at different design layers have been proposed …
security threat, various countermeasures at different design layers have been proposed …