Exploiting Voltage Regulators to Enhance Various Power Attack Countermeasures
نویسنده
چکیده
The security implications of on-chip voltage regulation on the effectiveness of various voltage/frequency scaling-based countermeasures such as random dynamic voltage and frequency scaling (RDVFS), random dynamic voltage scaling (RDVS), and aggressive voltage and frequency scaling (AVFS) are investigated. The side-channel leakage mechanisms of different on-chip voltage regulator topologies are mathematically analyzed and verified with circuit level simulations. Correlation coefficient between the input data and monitored power consumption of a cryptographic circuit is used as the security metric to compare the impact of different on-chip voltage regulators when implemented with the aforementioned countermeasures. As compared to a cryptographic circuit without countermeasure, the RDVFS technique implemented with an on-chip switched-capacitor voltage converter reduces the correlation coefficient over 80% and over 92% against differential and leakage power analysis attacks, respectively, through masking the leakage of the clock frequency and supply voltage information in the monitored power profile.
منابع مشابه
Application of TCSC and SVC to Enhance the Power System Static Voltage Stability
In this paper, the performance of two types of FACTS devices in order to enhance the power system static voltage stability has been investigated. These devices include Static Var Compensator (SVC) and Thyristor Controlled Series Capacitor (TCSC). The modeling of the Single Machine Infinite Bus (SMIB) and aforesaid devices has been made up in steady state mode with disregarding of the generator ...
متن کاملCPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking
Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against...
متن کاملA particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs
To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...
متن کاملGeneric Cryptanalysis of Combined Countermeasures with Randomized BSD Representations
In ICICS’04, Sim et al. proposed an attack against the full version of Ha-Moon’s countermeasure which is one of enhanced countermeasures. The analysis technique is based on the fact that the probability for the appearance of an intermediate value is p = 1/2. By our simulations, however, it is proven to be not true. Thus sometimes the output of their attack might be wrong because there exists th...
متن کاملEnhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension
Random delays and dynamic frequency switching are widely adopted in smartcards and embedded systems as temporal hiding countermeasures to side channel attack.Temporal hiding is regarded as efficient to enhance the security of cryptographic devices. However, spectral analysis with Fast Fourier Transform is a powerful method to defeat temporal hiding countermeasures. Spectral analysis shares the ...
متن کامل