题名 | Side-Channel Attack Counteraction via Machine Learning-Targeted Power Compensation for Post-Silicon HW Security Patching |
作者 | |
共同第一作者 | Fang, Qiang; Lin, Longyang |
DOI | |
发表日期 | 2022
|
会议名称 | 2022 IEEE International Solid- State Circuits Conference (ISSCC)
|
ISSN | 2376-8606
|
EISSN | 0193-6530
|
ISBN | 978-1-6654-2800-2
|
会议录名称 | |
卷号 | 65
|
页码 | 1-3
|
会议日期 | 20-26 Feb. 2022
|
会议地点 | San Francisco, CA, USA
|
出版者 | |
摘要 | Counteracting side-channel attacks has become a basic requirement in secure integrated circuits handling physical or sensitive data through cryptography, and preventing information leakage via power and electromagnetic (EM) emissions. Over time, the implementation of protection techniques against power analysis and EM attacks has progressively moved from design-specific (i.e., requiring redesign for their reuse [1]–[3]) to design-reusable frameworks [4]–[10], facilitating reuse with no modifications across designs, system security verification, and reducing the area/power overhead through reuse of existing silicon infrastructure across secure design IPs on the same die. Accordingly, embedding protection into regulators has been extensively explored to degrade the attack SNR and increase the minimum traces to key disclosure (MTD) via current equalization [4], a switching regulator with randomized loop control [5], a digital LDO (DLDO) with noise injection [6], a DLDO with randomized thresholds and AES transformations [7], a DLDO based on an edge-chasing quantizer [8], current-domain signature attenuation [9] and an additional time-varying transfer function [10]. Such protections allow design reuse and some degree of power-security flexibility, but have common limitations in that: 1) they indiscriminately compensate the entire large-signal power rather than focusing on small-signal information-sensitive power contributions, preventing power overhead reductions, 2) the level of protection is set at design time, and cannot improve after chip fabrication (no learning), 3) they cannot adapt to mitigate newly discovered side-channel vulnerabilities and attacks. Indeed, power overhead and security upgrade-ability over time are crucial in energy-autonomous systems with long lifespans and in applications where device replacement is expensive or unfeasible (e.g., IoT, implantables). |
关键词 | |
学校署名 | 共同第一
; 其他
|
相关链接 | [IEEE记录] |
收录类别 | |
EI入藏号 | 20221611985666
|
EI主题词 | Cost Reduction
; Machine Learning
; Signal To Noise Ratio
; Silicon
|
EI分类号 | Nonferrous Metals And Alloys Excluding Alkali And Alkaline Earth Metals:549.3
; Information Theory And Signal Processing:716.1
|
来源库 | 人工提交
|
全文链接 | https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9731755 |
引用统计 |
被引频次[WOS]:0
|
成果类型 | 会议论文 |
条目标识符 | http://sustech.caswiz.com/handle/2SGJ60CL/331427 |
专题 | 南方科技大学 工学院_深港微电子学院 |
作者单位 | 1.National University of Singapore 2.Southern University of Science and Technology |
推荐引用方式 GB/T 7714 |
Fang, Qiang,Lin, Longyang,Wong, Yao Zu,et al. Side-Channel Attack Counteraction via Machine Learning-Targeted Power Compensation for Post-Silicon HW Security Patching[C]:IEEE,2022:1-3.
|
条目包含的文件 | ||||||
文件名称/大小 | 文献类型 | 版本类型 | 开放类型 | 使用许可 | 操作 | |
Side-Channel_Attack_(1136KB) | -- | -- | 限制开放 | -- |
|
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论