Real-world snapshots vs. theory: Questioning the t-probing security model

T Krachenfels, F Ganji, A Moradi… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Due to its sound theoretical basis and practical efficiency, masking has become the most
prominent countermeasure to protect cryptographic implementations against physical side …

[PDF][PDF] EM Side Channels in Hardware Security: Attacks and Defenses.

J He, X Guo, MM Tehranipoor, A Vassilev… - IEEE Des …, 2022 - ieeexplore.ieee.org
Side channel analysis (SCA) imposes a severe security threat to circuit implementations,
especially to cryptographic hardware. Among all side channel parameters, electromagnetic …

SCNIFFER: Low-cost, automated, efficient electromagnetic side-channel sniffing

J Danial, D Das, S Ghosh, A Raychowdhury… - IEEE Access, 2020 - ieeexplore.ieee.org
Electromagnetic (EM) side-channel analysis (SCA) is a prominent tool to break
mathematically-secure cryptographic engines, especially on resource-constrained devices …

Leakyohm: Secret bits extraction using impedance analysis

SK Monfared, T Mosavirik, S Tajik - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
The threats of physical side-channel attacks and their countermeasures have been widely
researched. Most physical side-channel attacks rely on the unavoidable influence of …

Security-driven placement and routing tools for electromagnetic side-channel protection

H Ma, J He, Y Liu, L Liu, Y Zhao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Side-channel analysis (SCA) attacks are major threats to hardware security. Upon this
security threat, various countermeasures at different design layers have been proposed …

High-Performance Design Patterns and File Formats for Side-Channel Analysis

J Bosland, S Ene, P Baumgartner… - IACR Transactions on …, 2024 - tches.iacr.org
Data and instruction dependent power consumption can reveal cryptographic secrets by
means of Side-Channel Analysis (SCA). Consequently, manufacturers and evaluation labs …

Switch-Glitch: Location of Fault Injection Sweet Spots by Electro-Magnetic Emanation

M Probst, M Gruber, M Brosch… - 2024 Workshop on …, 2024 - ieeexplore.ieee.org
While several approaches exist to locate spatial coordinates on a chip that are susceptible to
Side-Channel Analysis (SCA), eg, Test Vector Leakage Assessment (TVLA), so far, an …

Securing AES against localized EM attacks through spatial randomization of dataflow

G Li, V Iyer, M Orshansky - 2019 IEEE International Symposium …, 2019 - ieeexplore.ieee.org
A localized electromagnetic (EM) attack is a potent threat to security of embedded
cryptographic implementations. The attack utilizes high resolution EM probes to localize and …

Security oriented design framework for em side-channel protection in rtl implementations

J He, H Ma, M Panoff, H Wang, Y Zhao… - … on Computer-Aided …, 2021 - ieeexplore.ieee.org
Electromagnetic (EM) side-channel analysis is a powerful attack for extracting secret
information from cryptographic hardware implementations. Countermeasures have been …

Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages

C Andrikos, L Batina, L Chmielewski, L Lerman… - Advances in Cryptology …, 2019 - Springer
Near-field microprobes have the capability to isolate small regions of a chip surface and
enable precise measurements with high spatial resolution. Being able to distinguish the …