Sok: Deep learning-based physical side-channel analysis

S Picek, G Perin, L Mariot, L Wu, L Batina - ACM Computing Surveys, 2023 - dl.acm.org
Side-channel attacks represent a realistic and serious threat to the security of embedded
devices for already almost three decades. A variety of attacks and targets they can be …

Bioelectronic sensor nodes for the internet of bodies

B Chatterjee, P Mohseni, S Sen - Annual Review of Biomedical …, 2023 - annualreviews.org
Energy-efficient sensing with physically secure communication for biosensors on, around,
and within the human body is a major area of research for the development of low-cost …

Physical attack protection techniques for IC chip level hardware security

M Nagata, T Miki, N Miura - IEEE transactions on very large …, 2021 - ieeexplore.ieee.org
Secure hardware systems are threatened by adversarial attempts on integrated circuit (IC)
chips in a practical utilization environment. This article provides overviews of physical …

Securing AES designs against power analysis attacks: a survey

TB Singha, RP Palathinkal… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the advent of Internet of Things (IoT), the call for hardware security has been seriously
demanding due to the risks of side-channel attacks from adversaries. Advanced encryption …

Electromagnetic analysis of integrated on-chip sensing loop for side-channel and fault-injection attack detection

A Ghosh, M Nath, D Das, S Ghosh… - IEEE Microwave and …, 2022 - ieeexplore.ieee.org
Securing crypto-cores is becoming increasingly difficult with the advent of electro-magnetic
(EM) side-channel analysis (EMSCA) and fault injection attacks (FIAs). This letter presents …

A 334 μW 0.158 mm2 ASIC for Post-Quantum Key-Encapsulation Mechanism Saber With Low-Latency Striding Toom–Cook Multiplication

A Ghosh, JMB Mera, A Karmakar, D Das… - IEEE Journal of Solid …, 2023 - ieeexplore.ieee.org
Lattice-based cryptography is a novel approach to public key cryptography (PKC), of which
the mathematical investigation (so far) resists attacks from quantum computers. By choosing …

EM/power side-channel attack: White-box modeling and signature attenuation countermeasures

D Das, S Ghosh, A Raychowdhury, S Sen - IEEE Design & Test, 2021 - ieeexplore.ieee.org
This article presents analysis methods to pin-point the cause of sidechannel leakage in
integrated circuits and proposes a number of techniques for leakage attenuation.-Rosario …

Side-channel attack counteraction via machine learning-targeted power compensation for post-silicon hw security patching

Q Fang, L Lin, Y Zu Wong, H Zhang… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Counteracting side-channel attacks has become a basic requirement in secure integrated
circuits handling physical or sensitive data through cryptography, and preventing information …

An 8.3-to-18Gbps reconfigurable SCA-resistant/dual-core/blind-bulk AES engine in Intel 4 CMOS

R Kumar, VB Suresh, MA Anders… - … Solid-State Circuits …, 2022 - ieeexplore.ieee.org
Power and electromagnetic (EM) side-channel attacks (SCA) exploit data-dependent power
consumption from cryptographic engines to extract embedded secret keys. While series …

PG-CAS: Pro-Active EM-SCA Probe Detection using Switched-Capacitor based Patterned-Ground Co-planar Capacitive Asymmetry Sensing

DH Seo, A Ghosh, D Das, M Nath… - IEEE Open Journal of …, 2023 - ieeexplore.ieee.org
This paper presents the design and analysis of a pro-active strategy to detect the presence
of an electromagnetic (EM) side-channel analysis (SCA) attack, using Patterned-Ground co …