EM attack sensor: Concept, circuit, and design-automation methodology
A side-channel attack exploiting EM-field leakage from a cryptographic processor IC is an existing serious threat to our information society. EM radiation during the IC operation is captured by an EM probe and the correlation to the crypto processing is statistically analyzed to reveal the secret in...
Uloženo v:
| Vydáno v: | Proceedings - ACM IEEE Design Automation Conference s. 1 - 6 |
|---|---|
| Hlavní autoři: | , , , , , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
01.06.2015
|
| Témata: | |
| ISSN: | 0738-100X |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | A side-channel attack exploiting EM-field leakage from a cryptographic processor IC is an existing serious threat to our information society. EM radiation during the IC operation is captured by an EM probe and the correlation to the crypto processing is statistically analyzed to reveal the secret information although it is protected in a software (algorithm) domain. This paper presents a reactive hardware (implementation) domain countermeasure against this EM attack, namely EM attack sensor. An on-chip sensor coil detects EM probe approach and reacts to protect the secret information from the tamper attack. The sensor concept and low-cost digital circuit implementation are reviewed, and the detail of the design-automation methodology highly-compatible to standard EDA tools is presented. A small hardware overhead of the sensor is silicon-proven in an actual 0.18μm CMOS test-chip implementation together with a 128bit AES crypto core. The test-chip measurements demonstrate successful sensor operation against the actual EM probe attack. |
|---|---|
| AbstractList | A side-channel attack exploiting EM-field leakage from a cryptographic processor IC is an existing serious threat to our information society. EM radiation during the IC operation is captured by an EM probe and the correlation to the crypto processing is statistically analyzed to reveal the secret information although it is protected in a software (algorithm) domain. This paper presents a reactive hardware (implementation) domain countermeasure against this EM attack, namely EM attack sensor. An on-chip sensor coil detects EM probe approach and reacts to protect the secret information from the tamper attack. The sensor concept and low-cost digital circuit implementation are reviewed, and the detail of the design-automation methodology highly-compatible to standard EDA tools is presented. A small hardware overhead of the sensor is silicon-proven in an actual 0.18μm CMOS test-chip implementation together with a 128bit AES crypto core. The test-chip measurements demonstrate successful sensor operation against the actual EM probe attack. |
| Author | Homma, Naofumi Nagata, Makoto Aoki, Takafumi Hayashi, Yuichi Fujimoto, Daisuke Miura, Noriyuki |
| Author_xml | – sequence: 1 givenname: Noriyuki surname: Miura fullname: Miura, Noriyuki email: miura@cs.kobe-u.ac.jp organization: Kobe Univ., Kobe, Japan – sequence: 2 givenname: Daisuke surname: Fujimoto fullname: Fujimoto, Daisuke organization: Kobe Univ., Kobe, Japan – sequence: 3 givenname: Makoto surname: Nagata fullname: Nagata, Makoto organization: Kobe Univ., Kobe, Japan – sequence: 4 givenname: Naofumi surname: Homma fullname: Homma, Naofumi email: homma@aoki.ecei.tohoku.ac.jp organization: Tohoku Univ., Sendai, Japan – sequence: 5 givenname: Yuichi surname: Hayashi fullname: Hayashi, Yuichi organization: Tohoku Univ., Sendai, Japan – sequence: 6 givenname: Takafumi surname: Aoki fullname: Aoki, Takafumi organization: Tohoku Univ., Sendai, Japan |
| BookMark | eNotjLFOwzAUAI1UJNrSmYHFH0CKX5zYMRuKUkAqYgGJrXqxX0qgsavYHfr3RILpbjjdgs188MTYDYg1QFHe57ootDLridrk8oKtjK5gclOJMjczNhdaVhkI8XnFFjF-CyEKUDBnTfPKMSW0PzySj2F84HXwlo7pjtt-tKd-EvSOO4r93md4SmHA1AfPB0pfwYVD2J-v2WWHh0irfy7Zx6Z5r5-z7dvTS_24zTCvRMrQtlKSAOsASQmorLJtV7YdWuXIFRZAGQWWqGxJIShNTrSlxc51GgHlkt3-fXsi2h3HfsDxvNNTKFUufwEZX05h |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1145/2744769.2747923 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) (UW System Shared) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 9781479980529 1479980528 |
| EndPage | 6 |
| ExternalDocumentID | 7167362 |
| Genre | orig-research |
| GroupedDBID | 123 29O 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ACGFS ADZIZ ALMA_UNASSIGNED_HOLDINGS APO BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IJVOP IPLJI M43 OCL RIE RIL RIO RNS |
| ID | FETCH-LOGICAL-a280t-acb33e01cd1ae6018c6cbf5bfac6ded4c116961cee5be6a167ed0b5cafdf7a1a3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000370268400178&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0738-100X |
| IngestDate | Wed Aug 27 02:20:00 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-a280t-acb33e01cd1ae6018c6cbf5bfac6ded4c116961cee5be6a167ed0b5cafdf7a1a3 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_7167362 |
| PublicationCentury | 2000 |
| PublicationDate | 20150601 |
| PublicationDateYYYYMMDD | 2015-06-01 |
| PublicationDate_xml | – month: 06 year: 2015 text: 20150601 day: 01 |
| PublicationDecade | 2010 |
| PublicationTitle | Proceedings - ACM IEEE Design Automation Conference |
| PublicationTitleAbbrev | DAC |
| PublicationYear | 2015 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0004161 |
| Score | 1.975979 |
| Snippet | A side-channel attack exploiting EM-field leakage from a cryptographic processor IC is an existing serious threat to our information society. EM radiation... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Calibration Cryptography Frequency measurement Hardware Layout Oscillators Probes |
| Title | EM attack sensor: Concept, circuit, and design-automation methodology |
| URI | https://ieeexplore.ieee.org/document/7167362 |
| WOSCitedRecordID | wos000370268400178&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV27bsIwFLUo6tAufUDVtzx0JBBD_EhXBOpSxNBKbOjavpZQpaQKSb-_toOAoUs329OV38e-5xxCXhClUzjmCQimPEDRfkmlzgNXroJUjB1z66LZhFws1GqVLztksOfCIGJMPsNhKMa_fFuaJjyVjfzdXsYN90RK0XK1DhxIFrVR_YwNcqXpaifjwzI-CiJ4UuTDAMDy4Et05KMSj5H5xf8CuCT9Ax-PLvcnzRXpYHFNzo-kBHtkNnunUNdgvujWI9OyeqXTlpE4oGZTmWbjC1BYamPKRgJNXbasRdqaSMfn9T75nM8-pm_JziIhgbFK6wSMnkwwZcYyQI-tlBFGO64dGGHRZoYxkQvm4-MaBfjw0aaaG3DWSWAwuSHdoizwltAcMOPKY2sBMsuDXi1whr5mWOq0tHekFzpk_d2qYKx3fXH_d_MDOfNXC94mVT2Sbl01-EROzU-92VbPceh-AUOEmo8 |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV27bsIwFLUQrdR26QOqvuuhI4EYYifpikBUBcRAJTZ0Y19LqFKCQtLvr-1EwNClm-3pyu9j33MOIW-IoY6wzz0QLDIAJTFLytcGuPLISsWoPlfamU2E83m0WsWLBunsuTCI6JLPsGuL7i9fZbK0T2U9c7cP3YZ7Yp2zarbWgQXJnDqqmbNWsNRf1UI-LOA9K4MXirhrIVhsnYmOnFTcQTK-_F8IV6R9YOTRxf6suSYNTG_IxZGYYIuMRjMKRQHym-4MNs3ydzqsOIkdKje5LDemAKmiyiVteFAWWcVbpJWNtHtgb5Ov8Wg5nHi1SYIH_cgvPJDJYIA-k4oBGnQVSSETzRMNUihUgWRMxIKZ-HiCAkz4qPyES9BKh8BgcEuaaZbiHaExYMAjg64FhEFsFWuBMzQ1yXydhOqetGyHrLeVDsa67ouHv5tfydlkOZuupx_zz0dybi4avEqxeiLNIi_xmZzKn2Kzy1_cMP4CgMCd2A |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+-+ACM+IEEE+Design+Automation+Conference&rft.atitle=EM+attack+sensor%3A+Concept%2C+circuit%2C+and+design-automation+methodology&rft.au=Miura%2C+Noriyuki&rft.au=Fujimoto%2C+Daisuke&rft.au=Nagata%2C+Makoto&rft.au=Homma%2C+Naofumi&rft.date=2015-06-01&rft.pub=IEEE&rft.issn=0738-100X&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1145%2F2744769.2747923&rft.externalDocID=7167362 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0738-100X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0738-100X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0738-100X&client=summon |