Sok: Deep learning-based physical side-channel analysis
Side-channel attacks represent a realistic and serious threat to the security of embedded
devices for already almost three decades. A variety of attacks and targets they can be …
devices for already almost three decades. A variety of attacks and targets they can be …
Bioelectronic sensor nodes for the internet of bodies
Energy-efficient sensing with physically secure communication for biosensors on, around,
and within the human body is a major area of research for the development of low-cost …
and within the human body is a major area of research for the development of low-cost …
Physical attack protection techniques for IC chip level hardware security
Secure hardware systems are threatened by adversarial attempts on integrated circuit (IC)
chips in a practical utilization environment. This article provides overviews of physical …
chips in a practical utilization environment. This article provides overviews of physical …
Securing AES designs against power analysis attacks: a survey
TB Singha, RP Palathinkal… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the advent of Internet of Things (IoT), the call for hardware security has been seriously
demanding due to the risks of side-channel attacks from adversaries. Advanced encryption …
demanding due to the risks of side-channel attacks from adversaries. Advanced encryption …
Electromagnetic analysis of integrated on-chip sensing loop for side-channel and fault-injection attack detection
Securing crypto-cores is becoming increasingly difficult with the advent of electro-magnetic
(EM) side-channel analysis (EMSCA) and fault injection attacks (FIAs). This letter presents …
(EM) side-channel analysis (EMSCA) and fault injection attacks (FIAs). This letter presents …
A 334 μW 0.158 mm2 ASIC for Post-Quantum Key-Encapsulation Mechanism Saber With Low-Latency Striding Toom–Cook Multiplication
Lattice-based cryptography is a novel approach to public key cryptography (PKC), of which
the mathematical investigation (so far) resists attacks from quantum computers. By choosing …
the mathematical investigation (so far) resists attacks from quantum computers. By choosing …
EM/power side-channel attack: White-box modeling and signature attenuation countermeasures
This article presents analysis methods to pin-point the cause of sidechannel leakage in
integrated circuits and proposes a number of techniques for leakage attenuation.-Rosario …
integrated circuits and proposes a number of techniques for leakage attenuation.-Rosario …
Side-channel attack counteraction via machine learning-targeted power compensation for post-silicon hw security patching
Counteracting side-channel attacks has become a basic requirement in secure integrated
circuits handling physical or sensitive data through cryptography, and preventing information …
circuits handling physical or sensitive data through cryptography, and preventing information …
An 8.3-to-18Gbps reconfigurable SCA-resistant/dual-core/blind-bulk AES engine in Intel 4 CMOS
Power and electromagnetic (EM) side-channel attacks (SCA) exploit data-dependent power
consumption from cryptographic engines to extract embedded secret keys. While series …
consumption from cryptographic engines to extract embedded secret keys. While series …
PG-CAS: Pro-Active EM-SCA Probe Detection using Switched-Capacitor based Patterned-Ground Co-planar Capacitive Asymmetry Sensing
This paper presents the design and analysis of a pro-active strategy to detect the presence
of an electromagnetic (EM) side-channel analysis (SCA) attack, using Patterned-Ground co …
of an electromagnetic (EM) side-channel analysis (SCA) attack, using Patterned-Ground co …