Impedance vs. Power Side-channel Vulnerabilities: A Comparative Study
- URL: http://arxiv.org/abs/2405.06242v3
- Date: Mon, 30 Sep 2024 21:46:20 GMT
- Title: Impedance vs. Power Side-channel Vulnerabilities: A Comparative Study
- Authors: Md Sadik Awal, Buddhipriya Gayanath, Md Tauhidur Rahman,
- Abstract summary: Physical side channels emerge from the relation between internal computation or data with observable physical parameters of a chip.
In this study, we conduct a comparative analysis of the impedance side channel, which has been limitedly explored, and the well-established power side channel.
Our findings indicate that impedance analysis demonstrates a higher potential for cryptographic key extraction compared to power side-channel analysis.
- Score: 1.5566524830295307
- License:
- Abstract: Physical side channels emerge from the relation between internal computation or data with observable physical parameters of a chip. Previous works mostly focus on properties related to current consumption such as power consumption. The fundamental property behind current consumption occur from the impedance of the chip. Contemporary works have stared using chip impedance as a physical side channel in extracting sensitive information from computing systems. It leverages variations in intrinsic impedance of a chip across different logic states. However, there has been a lack of comparative studies. In this study, we conduct a comparative analysis of the impedance side channel, which has been limitedly explored, and the well-established power side channel. Through experimental evaluation, we investigate the efficacy of these side channels in extracting stored advanced encryption standard (AES) cryptographic key on a memory and analyze their performance. Our findings indicate that impedance analysis demonstrates a higher potential for cryptographic key extraction compared to power side-channel analysis (SCA). Moreover, we identify scenarios where power SCA does not yield satisfactory results, whereas impedance analysis proves to be more robust and effective. This work not only underscores the significance of impedance SCA in enhancing cryptographic security but also emphasizes the necessity for a deeper understanding of its mechanisms and implications.
Related papers
- RandOhm: Mitigating Impedance Side-channel Attacks using Randomized Circuit Configurations [6.388730198692013]
We introduce RandOhm, which exploits a moving target defense (MTD) strategy based on the partial reconfiguration (PR) feature of mainstream FPGAs.
We demonstrate that the information leakage through the PDN impedance could be significantly reduced via runtime reconfiguration of the secret-sensitive parts of the circuitry.
In contrast to existing PR-based countermeasures, RandOhm deploys open-source bitstream manipulation tools to speed up the randomization and provide real-time protection.
arXiv Detail & Related papers (2024-01-17T02:22:28Z) - Utilizing Layout Effects for Analog Logic Locking [3.3123773366516645]
We present a groundbreaking method for safeguarding analog IP by harnessing layout-based effects that are typically considered undesirable in IC design.
Specifically, we exploit the impact of Length of Oxide Diffusion and Well Proximity Effect on transistors to fine-tune critical parameters such as transconductance (gm) and threshold voltage (Vth)
Our research explores the application of layout-based effects in two commercial CMOS technologies, namely a 28nm and a 65nm node.
arXiv Detail & Related papers (2024-01-12T11:13:04Z) - Impedance Leakage Vulnerability and its Utilization in Reverse-engineering Embedded Software [1.7495213911983414]
impedance is an inherent property of a device that can be exploited to leak information through an unintended side channel.
This paper demonstrates that the impedance of an embedded device is not constant and directly relates to the programs executed on the device.
We use this phenomenon as impedance leakage and use this as a side channel to extract software instructions from protected memory.
arXiv Detail & Related papers (2023-10-04T21:43:16Z) - Excitatory/Inhibitory Balance Emerges as a Key Factor for RBN
Performance, Overriding Attractor Dynamics [35.70635792124142]
Reservoir computing provides a time and cost-efficient alternative to traditional learning methods.
We show that specific distribution parameters can lead to diverse dynamics near critical points.
We then evaluate performance in two challenging tasks, memorization and prediction, and find that a positive excitatory balance produces a critical point with higher memory performance.
arXiv Detail & Related papers (2023-08-02T17:41:58Z) - Towards Dynamic Fault Tolerance for Hardware-Implemented Artificial
Neural Networks: A Deep Learning Approach [0.0]
This work investigates a deep learning approach to mitigate dynamic fault impact for artificial neural networks.
As a theoretic use case, image compression by means of a deep autoencoder is considered.
arXiv Detail & Related papers (2022-10-16T18:09:48Z) - Quantum circuit debugging and sensitivity analysis via local inversions [62.997667081978825]
We present a technique that pinpoints the sections of a quantum circuit that affect the circuit output the most.
We demonstrate the practicality and efficacy of the proposed technique by applying it to example algorithmic circuits implemented on IBM quantum machines.
arXiv Detail & Related papers (2022-04-12T19:39:31Z) - Anti-Oversmoothing in Deep Vision Transformers via the Fourier Domain
Analysis: From Theory to Practice [111.47461527901318]
Vision Transformer (ViT) has recently demonstrated promise in computer vision problems.
ViT saturates quickly with depth increasing, due to the observed attention collapse or patch uniformity.
We propose two techniques to mitigate the undesirable low-pass limitation.
arXiv Detail & Related papers (2022-03-09T23:55:24Z) - Towards Unbiased Visual Emotion Recognition via Causal Intervention [63.74095927462]
We propose a novel Emotion Recognition Network (IERN) to alleviate the negative effects brought by the dataset bias.
A series of designed tests validate the effectiveness of IERN, and experiments on three emotion benchmarks demonstrate that IERN outperforms other state-of-the-art approaches.
arXiv Detail & Related papers (2021-07-26T10:40:59Z) - Characterizing the loss landscape of variational quantum circuits [77.34726150561087]
We introduce a way to compute the Hessian of the loss function of VQCs.
We show how this information can be interpreted and compared to classical neural networks.
arXiv Detail & Related papers (2020-08-06T17:48:12Z) - Optimal Learning with Excitatory and Inhibitory synapses [91.3755431537592]
I study the problem of storing associations between analog signals in the presence of correlations.
I characterize the typical learning performance in terms of the power spectrum of random input and output processes.
arXiv Detail & Related papers (2020-05-25T18:25:54Z) - DeepSIC: Deep Soft Interference Cancellation for Multiuser MIMO
Detection [98.43451011898212]
In multiuser multiple-input multiple-output (MIMO) setups, where multiple symbols are simultaneously transmitted, accurate symbol detection is challenging.
We propose a data-driven implementation of the iterative soft interference cancellation (SIC) algorithm which we refer to as DeepSIC.
DeepSIC learns to carry out joint detection from a limited set of training samples without requiring the channel to be linear.
arXiv Detail & Related papers (2020-02-08T18:31:00Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.