Dongkyu Lee, Myeongjin Kang, Peter Plesznik, Jeonghun Cho, Daejin Park
{"title":"保护侧信道攻击的指令功耗置乱技术","authors":"Dongkyu Lee, Myeongjin Kang, Peter Plesznik, Jeonghun Cho, Daejin Park","doi":"10.1109/ICEIC49074.2020.9051111","DOIUrl":null,"url":null,"abstract":"This paper proposed the technique to protect the embedded devices from the timing analysis attack using a side-channel attack. Embedded devices have the advantage of excellent accessibility. However, because of the excellent accessibility, embedded devices are vulnerable to hardware attacks. In the case of the password matching function, the attacker can see the execution time of the function and infer which digits are matched monitoring the power consumption and using the timing analysis attack. In this paper, we proposed the clock scrambling method to hide the execution time of the instruction. It can help to protect embedded devices from the timing analysis attack by randomizing the execution time of the instruction. Our hardware model costs 2.56 % additional area for clock scrambler, and costs on average 28% in execution time and 27 % additional power consumption for scrambling power pattern.","PeriodicalId":271345,"journal":{"name":"2020 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Scrambling Technique of Instruction Power Consumption for Side-Channel Attack Protection\",\"authors\":\"Dongkyu Lee, Myeongjin Kang, Peter Plesznik, Jeonghun Cho, Daejin Park\",\"doi\":\"10.1109/ICEIC49074.2020.9051111\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposed the technique to protect the embedded devices from the timing analysis attack using a side-channel attack. Embedded devices have the advantage of excellent accessibility. However, because of the excellent accessibility, embedded devices are vulnerable to hardware attacks. In the case of the password matching function, the attacker can see the execution time of the function and infer which digits are matched monitoring the power consumption and using the timing analysis attack. In this paper, we proposed the clock scrambling method to hide the execution time of the instruction. It can help to protect embedded devices from the timing analysis attack by randomizing the execution time of the instruction. Our hardware model costs 2.56 % additional area for clock scrambler, and costs on average 28% in execution time and 27 % additional power consumption for scrambling power pattern.\",\"PeriodicalId\":271345,\"journal\":{\"name\":\"2020 International Conference on Electronics, Information, and Communication (ICEIC)\",\"volume\":\"104 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on Electronics, Information, and Communication (ICEIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEIC49074.2020.9051111\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Electronics, Information, and Communication (ICEIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEIC49074.2020.9051111","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Scrambling Technique of Instruction Power Consumption for Side-Channel Attack Protection
This paper proposed the technique to protect the embedded devices from the timing analysis attack using a side-channel attack. Embedded devices have the advantage of excellent accessibility. However, because of the excellent accessibility, embedded devices are vulnerable to hardware attacks. In the case of the password matching function, the attacker can see the execution time of the function and infer which digits are matched monitoring the power consumption and using the timing analysis attack. In this paper, we proposed the clock scrambling method to hide the execution time of the instruction. It can help to protect embedded devices from the timing analysis attack by randomizing the execution time of the instruction. Our hardware model costs 2.56 % additional area for clock scrambler, and costs on average 28% in execution time and 27 % additional power consumption for scrambling power pattern.