{"title":"基于功率分析的FPGA侧信道攻击及对策综述","authors":"Ali Hasnain, Yame Asfia, S. G. Khawaja","doi":"10.1109/ICoDT255437.2022.9787473","DOIUrl":null,"url":null,"abstract":"In recent years, there are many attacks revealed that can extract secret information from systems. These attacks are so powerful and serious threat to the security of systems. The side-channel attacks which use the power leakage of the cryptographic circuit during performing any operation to obtain a secret key are called power-based side-channel attacks. In this paper, we present a novel definition to explain these attacks, we present the difference between physical and remote power profiling methods and attacks. For our survey, we collect the more related and main information contained about power profiling-based attacks for purpose of a better literature survey. For the prevention of these attacks, we present the countermeasures based on masking and hiding techniques. We also present a brief discussion on attacks and their countermeasures.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Power profiling-based side-channel attacks on FPGA and Countermeasures: A survey\",\"authors\":\"Ali Hasnain, Yame Asfia, S. G. Khawaja\",\"doi\":\"10.1109/ICoDT255437.2022.9787473\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, there are many attacks revealed that can extract secret information from systems. These attacks are so powerful and serious threat to the security of systems. The side-channel attacks which use the power leakage of the cryptographic circuit during performing any operation to obtain a secret key are called power-based side-channel attacks. In this paper, we present a novel definition to explain these attacks, we present the difference between physical and remote power profiling methods and attacks. For our survey, we collect the more related and main information contained about power profiling-based attacks for purpose of a better literature survey. For the prevention of these attacks, we present the countermeasures based on masking and hiding techniques. We also present a brief discussion on attacks and their countermeasures.\",\"PeriodicalId\":291030,\"journal\":{\"name\":\"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)\",\"volume\":\"49 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICoDT255437.2022.9787473\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICoDT255437.2022.9787473","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Power profiling-based side-channel attacks on FPGA and Countermeasures: A survey
In recent years, there are many attacks revealed that can extract secret information from systems. These attacks are so powerful and serious threat to the security of systems. The side-channel attacks which use the power leakage of the cryptographic circuit during performing any operation to obtain a secret key are called power-based side-channel attacks. In this paper, we present a novel definition to explain these attacks, we present the difference between physical and remote power profiling methods and attacks. For our survey, we collect the more related and main information contained about power profiling-based attacks for purpose of a better literature survey. For the prevention of these attacks, we present the countermeasures based on masking and hiding techniques. We also present a brief discussion on attacks and their countermeasures.