EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor

نویسندگان

  • Naofumi Homma
  • Yu-ichi Hayashi
  • Noriyuki Miura
  • Daisuke Fujimoto
  • Daichi Tanaka
  • Makoto Nagata
  • Takafumi Aoki
چکیده

This paper presents a standard-cell-based semi-automatic design methodology of a new conceptual countermeasure against electromagnetic (EM) analysis and fault-injection attacks. The countermeasure namely EM attack sensor utilizes LC oscillators which detect variations in the EM field around a cryptographic LSI caused by a micro probe brought near the LSI. A dual-coil sensor architecture with an LUT-programming-based digital calibration can prevent a variety of microprobe-based EM attacks that cannot be thwarted by conventional countermeasures. All components of the sensor core are semiautomatically designed by standard EDA tools with a fully-digital standard cell library and hence minimum design cost. This sensor can be therefore scaled together with the cryptographic LSI to be protected. The sensor prototype is designed based on the proposed methodology together with a 128bit-key composite AES processor in 0.18μm CMOS with overheads of only 2% in area, 9% in power, and 0.2% in performance, respectively. The validity against a variety of EM attack scenarios has been verified successfully.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Method of Thwarting EM Probe Attacks on IC Interconnect

Key Results: Sensitive electromagnetic data emissions are no longer detectable by existing probes. How does the work advance the state-of-the-art?: Currently, physical shielding is the only tractable way to increase the difficulty of an EM attack. This paper outlines a method that uses CDMA in hardware to do much better. Motivation (problems addressed): Security devices are always under attack....

متن کامل

A note on the security of two improved RFID protocols

Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...

متن کامل

Near-Field Measurements for Safety Related Systems and Jamming Attack

Nowadays new safety related systems design includes electromagnetic analysis (EMA) during their development. Each of these systems is composed by smaller apparatuses that contain electronic components able to emit electromagnetic (EM) waves. On the other hand, the usage of smaller integrated circuit increases their susceptibility to EM interference. Companies often underestimate the importance ...

متن کامل

Verification of a CFD solver in near ground effect for aerodynamic behavior of airfoil NACA 0015

Numerical investigation was performed on NACA 0015 which is a symmetric airfoil. Pressure distribution and then lift and drag forces are verified. Changing of ground clearance was a considerable point. Also the angle of attack was changed from 0° to 10°. Pressure coefficient reaches its higher amounts on the wing lower surface when the ground clearance diminishes. Increment of the angle of atta...

متن کامل

Cryptanalysis of some first round CAESAR candidates

ΑΕS _ CMCCv₁, ΑVΑLΑNCHEv₁, CLΟCv₁, and SILCv₁ are four candidates of the first round of CAESAR. CLΟCv₁ is presented in FSE 2014 and SILCv₁ is designed upon it with the aim of optimizing the hardware implementation cost. In this paper, structural weaknesses of these candidates are studied. We present distinguishing attacks against ΑES  _ CMCCv₁ with the complexity of two queries and the success ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014