Impedance vs. Power Side-channel Vulnerabilities: A Comparative Study
- URL: http://arxiv.org/abs/2405.06242v1
- Date: Fri, 10 May 2024 04:44:34 GMT
- Title: Impedance vs. Power Side-channel Vulnerabilities: A Comparative Study
- Authors: Md Sadik Awal, Buddhipriya Gayanath, Md Tauhidur Rahman,
- Abstract summary: impedance side-channel analysis has emerged as a potent strategy for adversaries seeking to extract sensitive information from computing systems.
In this study, we conduct a comparative analysis between the newly explored impedance side channel and the well-established power side channel.
Our results indicate that impedance analysis demonstrates a higher potential for cryptographic key extraction compared to power side-channel analysis.
- Score: 1.5566524830295307
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In recent times, impedance side-channel analysis has emerged as a potent strategy for adversaries seeking to extract sensitive information from computing systems. It leverages variations in the intrinsic impedance of a chip's internal structure across different logic states. In this study, we conduct a comparative analysis between the newly explored impedance side channel and the well-established power side channel. Through experimental evaluation, we investigate the efficacy of these two side channels in extracting the cryptographic key from the Advanced Encryption Standard (AES) and analyze their performance. Our results indicate that impedance analysis demonstrates a higher potential for cryptographic key extraction compared to power side-channel analysis. Moreover, we identify scenarios where power side-channel analysis does not yield satisfactory results, whereas impedance analysis proves to be more robust and effective. This work not only underscores the significance of impedance side-channel analysis in enhancing cryptographic security but also emphasizes the necessity for a deeper understanding of its mechanisms and implications.
Related papers
- RandOhm: Mitigating Impedance Side-channel Attacks using Randomized Circuit Configurations [6.388730198692013]
We introduce RandOhm, which exploits a moving target defense (MTD) strategy based on the partial reconfiguration (PR) feature of mainstream FPGAs.
We demonstrate that the information leakage through the PDN impedance could be significantly reduced via runtime reconfiguration of the secret-sensitive parts of the circuitry.
In contrast to existing PR-based countermeasures, RandOhm deploys open-source bitstream manipulation tools to speed up the randomization and provide real-time protection.
arXiv Detail & Related papers (2024-01-17T02:22:28Z) - Impedance Leakage Vulnerability and its Utilization in Reverse-engineering Embedded Software [1.7495213911983414]
impedance is an inherent property of a device that can be exploited to leak information through an unintended side channel.
This paper demonstrates that the impedance of an embedded device is not constant and directly relates to the programs executed on the device.
We use this phenomenon as impedance leakage and use this as a side channel to extract software instructions from protected memory.
arXiv Detail & Related papers (2023-10-04T21:43:16Z) - Excitatory/Inhibitory Balance Emerges as a Key Factor for RBN
Performance, Overriding Attractor Dynamics [35.70635792124142]
Reservoir computing provides a time and cost-efficient alternative to traditional learning methods.
We show that specific distribution parameters can lead to diverse dynamics near critical points.
We then evaluate performance in two challenging tasks, memorization and prediction, and find that a positive excitatory balance produces a critical point with higher memory performance.
arXiv Detail & Related papers (2023-08-02T17:41:58Z) - Joint Channel Estimation and Feedback with Masked Token Transformers in
Massive MIMO Systems [74.52117784544758]
This paper proposes an encoder-decoder based network that unveils the intrinsic frequency-domain correlation within the CSI matrix.
The entire encoder-decoder network is utilized for channel compression.
Our method outperforms state-of-the-art channel estimation and feedback techniques in joint tasks.
arXiv Detail & Related papers (2023-06-08T06:15:17Z) - Robustness of Energy Landscape Control to Dephasing [0.0]
We analyze the robustness of the fidelity error, as measured by the logarithmic sensitivity function, to dephasing processes.
We show that despite the different log sensitivity calculations employed in this study, both demonstrate that the log-sensitivity of the fidelity error to dephasing results in a conventional trade-off between performance and robustness.
arXiv Detail & Related papers (2023-03-10T01:51:47Z) - An Empirical Analysis on the Vulnerabilities of End-to-End Speech
Segregation Models [0.8666275811953879]
We investigate ConvTasnet and DPT-Net to analyze how they perform a harmonic analysis of the input mixture.
We find that end-to-end networks are highly unstable, and perform poorly when confronted with deformations which are imperceptible to humans.
arXiv Detail & Related papers (2022-06-20T03:46:47Z) - Quantum circuit debugging and sensitivity analysis via local inversions [62.997667081978825]
We present a technique that pinpoints the sections of a quantum circuit that affect the circuit output the most.
We demonstrate the practicality and efficacy of the proposed technique by applying it to example algorithmic circuits implemented on IBM quantum machines.
arXiv Detail & Related papers (2022-04-12T19:39:31Z) - Improving robustness of jet tagging algorithms with adversarial training [56.79800815519762]
We investigate the vulnerability of flavor tagging algorithms via application of adversarial attacks.
We present an adversarial training strategy that mitigates the impact of such simulated attacks.
arXiv Detail & Related papers (2022-03-25T19:57:19Z) - Anti-Oversmoothing in Deep Vision Transformers via the Fourier Domain
Analysis: From Theory to Practice [111.47461527901318]
Vision Transformer (ViT) has recently demonstrated promise in computer vision problems.
ViT saturates quickly with depth increasing, due to the observed attention collapse or patch uniformity.
We propose two techniques to mitigate the undesirable low-pass limitation.
arXiv Detail & Related papers (2022-03-09T23:55:24Z) - Towards Unbiased Visual Emotion Recognition via Causal Intervention [63.74095927462]
We propose a novel Emotion Recognition Network (IERN) to alleviate the negative effects brought by the dataset bias.
A series of designed tests validate the effectiveness of IERN, and experiments on three emotion benchmarks demonstrate that IERN outperforms other state-of-the-art approaches.
arXiv Detail & Related papers (2021-07-26T10:40:59Z) - Optimal Learning with Excitatory and Inhibitory synapses [91.3755431537592]
I study the problem of storing associations between analog signals in the presence of correlations.
I characterize the typical learning performance in terms of the power spectrum of random input and output processes.
arXiv Detail & Related papers (2020-05-25T18:25:54Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.