Analyzing Side-Channel Attack Vulnerabilities at RTL

X. Lai, M. Jenihhin
{"title":"Analyzing Side-Channel Attack Vulnerabilities at RTL","authors":"X. Lai, M. Jenihhin","doi":"10.1109/LATS58125.2023.10154497","DOIUrl":null,"url":null,"abstract":"How much the timing side-channel attacks' vulner-ability can be mitigated at the early RTL design phase? This paper summarizes an Invited Talk presenting basic approaches for analyzing timing side-channel attack vulnerability in a generic information flow (illustrated on an RSA algorithm implementation) and in a common security architecture. The latter assumes, as an example, a Physical Unclonable Function (PUF) based chip-level authentication structure with potentially vulnerable ECC-powered Fuzzy Extractors.","PeriodicalId":145157,"journal":{"name":"2023 IEEE 24th Latin American Test Symposium (LATS)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE 24th Latin American Test Symposium (LATS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LATS58125.2023.10154497","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

How much the timing side-channel attacks' vulner-ability can be mitigated at the early RTL design phase? This paper summarizes an Invited Talk presenting basic approaches for analyzing timing side-channel attack vulnerability in a generic information flow (illustrated on an RSA algorithm implementation) and in a common security architecture. The latter assumes, as an example, a Physical Unclonable Function (PUF) based chip-level authentication structure with potentially vulnerable ECC-powered Fuzzy Extractors.
RTL侧信道攻击漏洞分析
在早期RTL设计阶段,可以减轻多少定时侧信道攻击的漏洞?本文总结了一篇特邀演讲,介绍了在通用信息流(在RSA算法实现中说明)和通用安全架构中分析时序侧信道攻击漏洞的基本方法。例如,后者假设基于物理不可克隆函数(PUF)的芯片级身份验证结构具有潜在的易受攻击的ecc驱动的模糊提取器。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信