Side-channel attack mitigation using dual-spacer Dual-rail Delay-insensitive Logic (D3L)

W. Cilio, M. Linder, Chris Porter, J. Di, S. Smith, D. Thompson
{"title":"Side-channel attack mitigation using dual-spacer Dual-rail Delay-insensitive Logic (D3L)","authors":"W. Cilio, M. Linder, Chris Porter, J. Di, S. Smith, D. Thompson","doi":"10.1109/SECON.2010.5453826","DOIUrl":null,"url":null,"abstract":"Side-channel attacks have become a threat to secure electronic circuits, due to the strong correlation between data pattern and leaking power/timing information. By monitoring the power/timing behavior of a synchronous circuit, an attacker can easily obtain the secret data stored in the device. Although dual-rail asynchronous circuits have more stable power traces, they still show power fluctuation because of the imbalanced load between two rails. Moreover, asynchronous circuits are the most prone to timing attacks since delay is data dependent. Dual-spacer Dual-rail Delay-insensitive Logic (D3L), presented in this paper, is able to mitigate power and timing based side-channel attacks. Power fluctuation is decoupled from data pattern by the use of a dual-spacer protocol, while timing-data correlation is broken by insertion of random delays.","PeriodicalId":286940,"journal":{"name":"Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECON.2010.5453826","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 16

Abstract

Side-channel attacks have become a threat to secure electronic circuits, due to the strong correlation between data pattern and leaking power/timing information. By monitoring the power/timing behavior of a synchronous circuit, an attacker can easily obtain the secret data stored in the device. Although dual-rail asynchronous circuits have more stable power traces, they still show power fluctuation because of the imbalanced load between two rails. Moreover, asynchronous circuits are the most prone to timing attacks since delay is data dependent. Dual-spacer Dual-rail Delay-insensitive Logic (D3L), presented in this paper, is able to mitigate power and timing based side-channel attacks. Power fluctuation is decoupled from data pattern by the use of a dual-spacer protocol, while timing-data correlation is broken by insertion of random delays.
利用双间隔器双轨延迟不敏感逻辑(D3L)缓解侧信道攻击
由于数据模式与泄漏的功率/时序信息之间存在很强的相关性,侧信道攻击已成为安全电子电路的一大威胁。通过监控同步电路的功率/定时行为,攻击者可以很容易地获得存储在设备中的秘密数据。双轨异步电路虽然具有较稳定的功率走线,但由于两轨间负载的不平衡,仍然存在功率波动。此外,异步电路最容易受到定时攻击,因为延迟依赖于数据。本文提出的双间隔器双轨延迟不敏感逻辑(D3L)能够减轻基于功率和时序的侧信道攻击。通过使用双间隔协议将功率波动与数据模式解耦,同时通过插入随机延迟打破时间与数据的相关性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信