Embedded randomness and data dependencies design paradigm: Advantages and challenges

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Information leakage through physical channels is a major hurdle in embedded hardware security. This paper overviews the three key factors in the embedded hardware security space, focusing on gray-box (bounded resources) power analysis attacks: The adversary's knowledge and abilities, the security metrics used by adversaries' and security evaluators and gate-level countermeasures. A new design paradigm, dubbed pAsynch, that utilizes internal signals and random signals to uniformly spread the information-carrying energy within the clock period in a specific way with a resolution below the band-width and noise-filtering abilities of advanced measurement equipment is introduced. The advantages and design challenges introduced by the pAsynch paradigm are discussed.

Original languageEnglish
Title of host publicationProceedings of the 2018 Design, Automation and Test in Europe Conference and Exhibition, DATE 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages395-400
Number of pages6
ISBN (Electronic)9783981926316
DOIs
StatePublished - 19 Apr 2018
Event2018 Design, Automation and Test in Europe Conference and Exhibition, DATE 2018 - Dresden, Germany
Duration: 19 Mar 201823 Mar 2018

Publication series

NameProceedings of the 2018 Design, Automation and Test in Europe Conference and Exhibition, DATE 2018
Volume2018-January

Conference

Conference2018 Design, Automation and Test in Europe Conference and Exhibition, DATE 2018
Country/TerritoryGermany
CityDresden
Period19/03/1823/03/18

Bibliographical note

Publisher Copyright:
© 2018 EDAA.

Keywords

  • hardware security
  • information leakage
  • pAsynch
  • pseudo asynchronous
  • side channel

Fingerprint

Dive into the research topics of 'Embedded randomness and data dependencies design paradigm: Advantages and challenges'. Together they form a unique fingerprint.

Cite this