The Community for Technology Leaders
2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (2015)
Washington, DC, USA
May 5, 2015 to May 7, 2015
ISBN: 978-1-4673-7421-7
pp: 92-95
Sushmita Kadiyala Rao , Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County
Deepak Krishnankutty , Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County
Ryan Robucci , Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County
Nilanjan Banerjee , Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County
Chintan Patel , Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County
ABSTRACT
Two major security challenges for integrated circuits (IC) that involve encryption cores are side-channel based attacks and malicious hardware insertions (trojans). Side-channel attacks predominantly use power supply measurements to exploit the correlation of power consumption with the underlying logic operations on an IC. Practical attacks have been demonstrated using power supply traces and either plaintext or cipher-text collected during encryption operations. Also, several techniques that detect trojans rely on detecting anomalies in the power supply in combination with other circuit parameters. Counter-measures against these side-channel attacks as well as detection schemes for hardware trojans are required and rely on accurate pre-fabrication power consumption predictions. However, available state-of-the-art techniques would require prohibitive full-chip SPICE simulations. In this work, we present an optimized technique to accurately estimate the power supply signatures that require significantly less computational resources, thus enabling integration of Design-for-Security (DfS) based paradigms. To demonstrate the effectiveness of our technique, we present data for a DES crypto-system that proves that our framework can identify vulnerabilities to Differential Power Analysis (DPA) attacks. Our framework can be generically applied to other crypto-systems and can handle larger IC designs without loss of accuracy.
INDEX TERMS
SPICE, Power supplies, Security, Correlation, Transient analysis, Integrated circuits, Hardware
CITATION

S. K. Rao, D. Krishnankutty, R. Robucci, N. Banerjee and C. Patel, "Post-layout estimation of side-channel power supply signatures," 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Washington, DC, USA, 2015, pp. 92-95.
doi:10.1109/HST.2015.7140244
84 ms
(Ver 3.3 (11022016))