Sok: Design tools for side-channel-aware implementations
Side-channel attacks that leak sensitive information through a computing device's interaction
with its physical environment have proven to be a severe threat to devices' security …
with its physical environment have proven to be a severe threat to devices' security …
PROLEAD: A probing-based hardware leakage detection tool
Abstract Even today, Side-Channel Analysis attacks pose a serious threat to the security of
cryptographic implementations fabricated with low-power and nanoscale feature …
cryptographic implementations fabricated with low-power and nanoscale feature …
Emulating side channel attacks on gem5: lessons learned
Side channel attacks (SCA) have the potential of disrupting the trust of the users on
computing platforms and cryptographic algorithms. The main challenge in the design of …
computing platforms and cryptographic algorithms. The main challenge in the design of …
SoC Root Canal! Root cause analysis of power side-channel leakage in system-on-chip designs
P Kiaei, P Schaumont - IACR Transactions on Cryptographic …, 2022 - tches.iacr.org
Finding the root cause of power-based side-channel leakage becomes harder when
multiple layers of design abstraction are involved. While side-channel leakage originates in …
multiple layers of design abstraction are involved. While side-channel leakage originates in …
A memory hierarchy protected against side-channel attacks
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the
most valuable element to protect against information theft. Many first-order side-channel …
most valuable element to protect against information theft. Many first-order side-channel …
PreSCAN: A Comprehensive Review of Pre-Silicon Physical Side-Channel Vulnerability Assessment Methodologies
Physical side-channel attacks utilize power, electromagnetic (EM), or timing signatures from
cryptographic implementations during operation to retrieve sensitive information from …
cryptographic implementations during operation to retrieve sensitive information from …
Gate-level side-channel leakage assessment with architecture correlation analysis
While side-channel leakage is traditionally evaluated from a fabricated chip, it is more time-
efficient and cost-effective to do so during the design phase of the chip. We present a …
efficient and cost-effective to do so during the design phase of the chip. We present a …
Automatic on-chip clock network optimization for electromagnetic side-channel protection
Commercial electronic design automation (EDA) tools typically focus on optimizing the
power, area, and speed of integrated circuits (ICs). They rarely consider hardware security …
power, area, and speed of integrated circuits (ICs). They rarely consider hardware security …
Leverage the average: Averaged sampling in pre-silicon side-channel leakage assessment
Pre-silicon side-channel leakage assessment is a useful tool to identify hardware
vulnerabilities at design time, but it requires many high-resolution power traces and …
vulnerabilities at design time, but it requires many high-resolution power traces and …
EM SCA White-Box Analysis-Based Reduced Leakage Cell Design and Presilicon Evaluation
This work presents a white-box modeling of the electromagnetic (EM) leakage from an
integrated circuit (IC) to develop EM side-channel analysis (SCA)-aware design techniques …
integrated circuit (IC) to develop EM side-channel analysis (SCA)-aware design techniques …