Sok: Design tools for side-channel-aware implementations

I Buhan, L Batina, Y Yarom, P Schaumont - … of the 2022 ACM on Asia …, 2022 - dl.acm.org
Side-channel attacks that leak sensitive information through a computing device's interaction
with its physical environment have proven to be a severe threat to devices' security …

PROLEAD: A probing-based hardware leakage detection tool

N Müller, A Moradi - IACR Transactions on Cryptographic Hardware …, 2022 - tches.iacr.org
Abstract Even today, Side-Channel Analysis attacks pose a serious threat to the security of
cryptographic implementations fabricated with low-power and nanoscale feature …

Emulating side channel attacks on gem5: lessons learned

L Bossuet, V Grosso… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
Side channel attacks (SCA) have the potential of disrupting the trust of the users on
computing platforms and cryptographic algorithms. The main challenge in the design of …

SoC Root Canal! Root cause analysis of power side-channel leakage in system-on-chip designs

P Kiaei, P Schaumont - IACR Transactions on Cryptographic …, 2022 - tches.iacr.org
Finding the root cause of power-based side-channel leakage becomes harder when
multiple layers of design abstraction are involved. While side-channel leakage originates in …

A memory hierarchy protected against side-channel attacks

EB Talaki, O Savry, M Bouvier Des Noes, D Hely - Cryptography, 2022 - mdpi.com
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the
most valuable element to protect against information theft. Many first-order side-channel …

PreSCAN: A Comprehensive Review of Pre-Silicon Physical Side-Channel Vulnerability Assessment Methodologies

MK Bepary, T Zhang, F Farahmandi, M Tehranipoor - Chips, 2024 - mdpi.com
Physical side-channel attacks utilize power, electromagnetic (EM), or timing signatures from
cryptographic implementations during operation to retrieve sensitive information from …

Gate-level side-channel leakage assessment with architecture correlation analysis

P Kiaei, Y Yao, Z Liu, N Fern, CB Breunesse… - arXiv preprint arXiv …, 2022 - arxiv.org
While side-channel leakage is traditionally evaluated from a fabricated chip, it is more time-
efficient and cost-effective to do so during the design phase of the chip. We present a …

Automatic on-chip clock network optimization for electromagnetic side-channel protection

H Ma, J He, M Panoff, Y Jin… - IEEE Journal on emerging …, 2021 - ieeexplore.ieee.org
Commercial electronic design automation (EDA) tools typically focus on optimizing the
power, area, and speed of integrated circuits (ICs). They rarely consider hardware security …

Leverage the average: Averaged sampling in pre-silicon side-channel leakage assessment

P Kiaei, Z Liu, P Schaumont - … of the Great Lakes Symposium on VLSI …, 2022 - dl.acm.org
Pre-silicon side-channel leakage assessment is a useful tool to identify hardware
vulnerabilities at design time, but it requires many high-resolution power traces and …

EM SCA White-Box Analysis-Based Reduced Leakage Cell Design and Presilicon Evaluation

D Das, M Nath, B Chatterjee, R Kumar… - … on Computer-Aided …, 2022 - ieeexplore.ieee.org
This work presents a white-box modeling of the electromagnetic (EM) leakage from an
integrated circuit (IC) to develop EM side-channel analysis (SCA)-aware design techniques …