Hardware security exploiting post-CMOS devices: fundamental device characteristics, state-of-the-art countermeasures, challenges and roadmap

A Japa, MK Majumder, SK Sahoo… - IEEE Circuits and …, 2021 - ieeexplore.ieee.org
Emerging nanoelectronic semiconductor devices have been quite promising in enhancing
hardware-oriented security and trust. However, implementing hardware security primitives …

STELLAR: A generic EM side-channel attack protection through ground-up root-cause analysis

D Das, M Nath, B Chatterjee… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
The threat of side-channels is becoming increasingly prominent for resource-constrained
internet-connected devices. While numerous power side-channel countermeasures have …

[PDF][PDF] EM Side Channels in Hardware Security: Attacks and Defenses.

J He, X Guo, MM Tehranipoor, A Vassilev… - IEEE Des …, 2022 - ieeexplore.ieee.org
Side channel analysis (SCA) imposes a severe security threat to circuit implementations,
especially to cryptographic hardware. Among all side channel parameters, electromagnetic …

Architecture correlation analysis (ACA): Identifying the source of side-channel leakage at gate-level

Y Yao, T Kathuria, B Ege… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Power-based side-channel leakage is a known problem in the design of security-centric
electronic systems. As the complexity of modern systems rapidly increases through the use …

Multiphysics simulation of em side-channels from silicon backside with ml-based auto-poi identification

L Lin, D Zhu, J Wen, H Chen, Y Lu… - … Security and Trust …, 2021 - ieeexplore.ieee.org
The silicon substrate backside of modern ICs is increasingly recognized as a critical
hardware vulnerability, which opens a backdoor for laser/optical probing, fault injection and …

A fast side-channel leakage simulation technique based on IC chip power modeling

A Tsukioka, K Srinivasan, S Wan, L Lin… - IEEE Letters on …, 2019 - ieeexplore.ieee.org
Hardware-based secure integrated circuit (IC) chips with implemented cryptographic
algorithms are vulnerable to practical attacks analyzing side-channel (SC) leakage such as …

Checking robustness against EM side-channel attacks prior to manufacturing

D Poggi, T Ordas, A Sarafianos… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Electromagnetic attacks, which in fact exploit essentially the magnetic field generated by ICs,
are commonly used by adversaries to retrieve secret information manipulated by integrated …

EMSim: A Fast Layout Level Electromagnetic Emanation Simulation Framework for High Accuracy Pre-Silicon Verification

H Ma, M Panoff, J He, Y Zhao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Electromagnetic (EM) emanation measurement and evaluation is one important testing for
modern integrated circuits (ICs). Severe electromagnetic interference may degrade the …

Systematic Literature Review of EM-SCA Attacks on Encryption

MR Zunaidi, A Sayakkara, M Scanlon - arXiv preprint arXiv:2402.10030, 2024 - arxiv.org
Cryptography is vital for data security, but cryptographic algorithms can still be vulnerable to
side-channel attacks (SCAs), physical assaults exploiting power consumption and EM …

Security-driven placement and routing tools for electromagnetic side-channel protection

H Ma, J He, Y Liu, L Liu, Y Zhao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Side-channel analysis (SCA) attacks are major threats to hardware security. Upon this
security threat, various countermeasures at different design layers have been proposed …