• DocumentCode
    2959201
  • Title

    Post-layout estimation of side-channel power supply signatures

  • Author

    Rao, Sushmita Kadiyala ; Krishnankutty, Deepak ; Robucci, Ryan ; Banerjee, Nilanjan ; Patel, Chintan

  • Author_Institution
    Dept. of Comput. Sci. & Electr. Eng., Univ. of Maryland, Baltimore, MD, USA
  • fYear
    2015
  • fDate
    5-7 May 2015
  • Firstpage
    92
  • Lastpage
    95
  • Abstract
    Two major security challenges for integrated circuits (IC) that involve encryption cores are side-channel based attacks and malicious hardware insertions (trojans). Side-channel attacks predominantly use power supply measurements to exploit the correlation of power consumption with the underlying logic operations on an IC. Practical attacks have been demonstrated using power supply traces and either plaintext or cipher-text collected during encryption operations. Also, several techniques that detect trojans rely on detecting anomalies in the power supply in combination with other circuit parameters. Counter-measures against these side-channel attacks as well as detection schemes for hardware trojans are required and rely on accurate pre-fabrication power consumption predictions. However, available state-of-the-art techniques would require prohibitive full-chip SPICE simulations. In this work, we present an optimized technique to accurately estimate the power supply signatures that require significantly less computational resources, thus enabling integration of Design-for-Security (DfS) based paradigms. To demonstrate the effectiveness of our technique, we present data for a DES crypto-system that proves that our framework can identify vulnerabilities to Differential Power Analysis (DPA) attacks. Our framework can be generically applied to other crypto-systems and can handle larger IC designs without loss of accuracy.
  • Keywords
    cryptography; estimation theory; integrated circuit layout; logic testing; power consumption; power supply circuits; security; DES cryptosystem; DPA; DfS; IC; SPICE simulation; anomaly detection; cipher-text; design-for-security; differential power analysis; encryption core; hardware trojan; integrated circuit; logic operation; malicious hardware insertion; plaintext; post-layout estimation; power consumption correlation; power supply measurement; power supply tracing; practical attack; prefabrication power consumption prediction; side-channel based attack; side-channel power supply signature estimation; Correlation; Hardware; Integrated circuits; Power supplies; SPICE; Security; Transient analysis; Hardware Security; Power Supply analysis; Side-channel attacks; Trojan Detection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Hardware Oriented Security and Trust (HOST), 2015 IEEE International Symposium on
  • Conference_Location
    Washington, DC
  • Type

    conf

  • DOI
    10.1109/HST.2015.7140244
  • Filename
    7140244