Hardware security exploiting post-CMOS devices: Fundamental device characteristics, state-of-the-art countermeasures, challenges and roadmap

A Japa, MK Majumder, SK Sahoo… - IEEE Circuits and …, 2021 - ieeexplore.ieee.org
Emerging nanoelectronic semiconductor devices have been quite promising in enhancing
hardware-oriented security and trust. However, implementing hardware security primitives …

Gini-impurity index analysis

Y Yuan, L Wu, X Zhang - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
In the past few decades, DPA-based side-channel attack strategies, such as DPA and CPA,
have shown strong ability to analyze the security of the cryptographic implementations …

Attacks on cryptosystems implemented via VLSI: A review

MM Sravani, SA Durai - Journal of Information Security and Applications, 2021 - Elsevier
Serious threats to the VLSI crypto devices are posed by the Side Channel Attack (SCA) that
utilizes the devices' SCI (Side Channel Information) to break the entire cryptographic …

SCAUL: Power side-channel analysis with unsupervised learning

K Ramezanpour, P Ampadu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Existing power analysis techniques rely on strong adversary models with prior knowledge of
the leakage or training data. We introduce side-channel analysis with unsupervised learning …

Compositional verification of efficient masking countermeasures against side-channel attacks

P Gao, Y Zhang, F Song, T Chen… - Proceedings of the ACM …, 2023 - dl.acm.org
Masking is one of the most effective countermeasures for securely implementing
cryptographic algorithms against power side-channel attacks, the design of which however …

Exploiting the back-gate biasing technique as a countermeasure against power analysis attacks

BA Dao, TT Hoang, AT Le, A Tsukamoto… - IEEE …, 2021 - ieeexplore.ieee.org
Fully depleted silicon-on-insulator (FD-SOI) technology is renowned for its back-gate bias
voltage controllability. It allows devices fabricated with FD-SOI technology to be optimized …

[PDF][PDF] 侧信道攻击与防御技术研究进展

王永娟, 樊昊鹏, 代政一, 袁庆军, 王相宾 - 计算机学报, 2023 - 159.226.43.17
摘要侧信道攻击利用密码实现的物理泄露而不是理论弱点来恢复密钥, 对密码系统的安全实现有
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …

An energy trace compression method for differential power analysis attack

X Cai, R Li, S Kuang, J Tan - IEEE Access, 2020 - ieeexplore.ieee.org
Differential power analysis attacks are the most commonly used means to break
cryptographic devices within the side-channel attack technology. Since there is a lot of noise …

Attacking the edge-of-things: A physical attack perspective

K Gai, Y Ding, A Wang, L Zhu… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The concepts between Internet of Things (IoT) and edge computing are increasingly
intertwined, as an edge-computing architecture generally comprises a (large) number of …

Formal verification of masking countermeasures for arithmetic programs

P Gao - Proceedings of the 35th IEEE/ACM International …, 2020 - dl.acm.org
Cryptographic algorithms are widely used to protect data privacy in many aspects of daily
lives from smart card to cyber-physical systems. Unfortunately, programs implementing …