skip to main content
10.1145/3400302.3415692acmconferencesArticle/Chapter ViewAbstractPublication PagesiccadConference Proceedingsconference-collections
research-article
Public Access

Power side channel attack analysis and detection

Published: 17 December 2020 Publication History

Abstract

Side Channel Attack (SCA) is a serious threat to the hardware implementation of cryptographic protocols. Various side channels such as, power, timing, electromagnetic emission and acoustic noise have been explored to extract the secret keys. Machine Learning (ML)-based detection of SCA have been proposed in past which incur high design overheads and, require digitization that reduce their accuracy under process variations. We propose a real-time power SCA detection technique using on-chip sensors based on a thorough analysis. The dependency of phase/frequency of Ring Oscillator (RO) on supply voltage is exploited to detect the insertion of a SCA resistance in the power rail. The proposed approach is validated using simulation with a detailed model of Power Delivery Network (PDN) and power grid. The technique can detect a minimum resistance of 1 Ω within 2 μs of attack initiation and incurs a tiny fraction of area/power (0.044%/0.1065%, respectively) compared to ML-based techniques.

References

[1]
S. Bhunia and M. Tehranipoor, "Chapter 8 - side-channel attacks," in Hardware Security, pp. 193 -- 218, Morgan Kaufmann, 2019.
[2]
D. J. Bernstein, "Cache-timing attacks on aes," 2005. https://cr.yp.to/antiforgery/cachetiming-20050414.pdf.
[3]
X. Fong, S. H. Choday, and K. Roy, "Design and optimization of spin-transfer torque mrams," in More than Moore Technologies for Next Generation Computer Design, pp. 49--72, Springer, 2015.
[4]
K. Gandolfi, C. Mourtel, and F. Olivier, "Electromagnetic analysis: Concrete results," in International Workshop on Cryptographic Hardware and Embedded Systems, pp. 251--261, Springer, 2001.
[5]
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in Advances in Cryptology --- CRYPTO' 99 (M. Wiener, ed.), (Berlin, Heidelberg), pp. 388--397, Springer Berlin Heidelberg, 1999.
[6]
E. Brier, C. Clavier, and F. Olivier, "Correlation power analysis with a leakage model," in Cryptographic Hardware and Embedded Systems - CHES 2004 (M. Joye and J.-J. Quisquater, eds.), pp. 16--29, Springer Berlin Heidelberg, 2004.
[7]
D. Utyamishev and I. Partin-Vaisband, "Real-time detection of power analysis attacks by machine learning of power supply variations on-chip," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp. 1--1, 2018.
[8]
F. Kenarangi and I. Partin-Vaisband, "Exploiting machine learning against on-chip power analysis attacks: Tradeoffs and design considerations," IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 66, pp. 769--781, Feb 2019.
[9]
M. S. Gupta, J. L. Oatley, R. Joseph, G. Wei, and D. M. Brooks, "Understanding voltage variations in chip multiprocessors using a distributed power-delivery network," in 2007 Design, Automation Test in Europe Conference Exhibition, 2007.
[10]
N. Takahashi, M. Nose, S. Kaeko, and Y. Takahashi, "Analysis of complete power-distribution network and co-design optimization," Transactions of The Japan Institute of Electronics Packaging, vol. 2, no. 1, pp. 69--74, 2009.
[11]
K. Aygun, "Power delivery for high-performance microprocessors," Intel Technology Journal, vol. 09, 11 2005.
[12]
P. Pessl and M. Hutter, "Pushing the limits of sha-3 hardware implementations to fit on rfid," vol. 8086, pp. 126--141, 08 2013.
[13]
M. T. Rahman, F. Rahman, D. Forte, and M. Tehranipoor, "An aging-resistant ro-puf for reliable key generation," IEEE Transactions on Emerging Topics in Computing, vol. 4, pp. 335--348, July 2016.
[14]
A. Singh, M. Kar, S. K. Mathew, A. Rajan, V. De, and S. Mukhopadhyay, "Improved power/em side-channel attack resistance of 128-bit aes engines with random fast voltage dithering," IEEE Journal of Solid-State Circuits, 2019.

Cited By

View all
  • (2025)Detection of Voltage Droop-Induced Timing Fault Attacks Due to Hardware TrojansIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2024.341839544:1(280-293)Online publication date: Jan-2025
  • (2025)Side-channel attacks and countermeasures for heart rate retrieval from ECG characterization deviceInternational Journal of Information Security10.1007/s10207-024-00927-824:1Online publication date: 1-Feb-2025
  • (2025)ReBO-Driven IC Design: Leveraging Reconfigurable Logic for ObfuscationReconfigurable Obfuscation Techniques for the IC Supply Chain10.1007/978-3-031-77509-3_3(43-56)Online publication date: 12-Jan-2025
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICCAD '20: Proceedings of the 39th International Conference on Computer-Aided Design
November 2020
1396 pages
ISBN:9781450380263
DOI:10.1145/3400302
  • General Chair:
  • Yuan Xie
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

  • IEEE CAS
  • IEEE CEDA
  • IEEE CS

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 December 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. phase detection
  2. power grid
  3. power side channel attack detection

Qualifiers

  • Research-article

Funding Sources

Conference

ICCAD '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 457 of 1,762 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)296
  • Downloads (Last 6 weeks)41
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Detection of Voltage Droop-Induced Timing Fault Attacks Due to Hardware TrojansIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2024.341839544:1(280-293)Online publication date: Jan-2025
  • (2025)Side-channel attacks and countermeasures for heart rate retrieval from ECG characterization deviceInternational Journal of Information Security10.1007/s10207-024-00927-824:1Online publication date: 1-Feb-2025
  • (2025)ReBO-Driven IC Design: Leveraging Reconfigurable Logic for ObfuscationReconfigurable Obfuscation Techniques for the IC Supply Chain10.1007/978-3-031-77509-3_3(43-56)Online publication date: 12-Jan-2025
  • (2024)2FAKA-C/S: A Robust Two-Factor Authentication and Key Agreement Protocol for C/S Data Transmission in Federated LearningApplied Sciences10.3390/app1415666414:15(6664)Online publication date: 30-Jul-2024
  • (2024)SoK Paper: Power Side-Channel Malware DetectionProceedings of the International Workshop on Hardware and Architectural Support for Security and Privacy 202410.1145/3696843.3696849(1-9)Online publication date: 2-Nov-2024
  • (2023)A Novel Authentication Method That Combines Honeytokens and Google AuthenticatorInformation10.3390/info1407038614:7(386)Online publication date: 7-Jul-2023
  • (2023)Design of Lightweight Cryptography based Deep Learning Model for Side Channel Attacks2023 33rd International Telecommunication Networks and Applications Conference10.1109/ITNAC59571.2023.10368560(325-328)Online publication date: 29-Nov-2023
  • (2023)Late Breaking Results: Configurable Ring Oscillators as a Side-Channel Countermeasure2023 60th ACM/IEEE Design Automation Conference (DAC)10.1109/DAC56929.2023.10247786(1-2)Online publication date: 9-Jul-2023
  • (2023)Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping StudyIEEE Access10.1109/ACCESS.2023.327575711(48945-48976)Online publication date: 2023
  • (2023)EARIC: Exploiting ADC Registers in IoT and Control SystemsApplied Cryptography and Network Security Workshops10.1007/978-3-031-41181-6_14(245-265)Online publication date: 4-Oct-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media