STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis

D. Das, Mayukh Nath, Baibhab Chatterjee, Santosh K. Ghosh, Shreyas Sen
{"title":"STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis","authors":"D. Das, Mayukh Nath, Baibhab Chatterjee, Santosh K. Ghosh, Shreyas Sen","doi":"10.1109/HST.2019.8740839","DOIUrl":null,"url":null,"abstract":"The threat of side-channels is becoming increasingly prominent for resource-constrained internet-connected devices. While numerous power side-channel countermeasures have been proposed, a promising approach to protect the non-invasive electromagnetic side-channel attacks has been relatively scarce. Today’s availability of high-resolution electromagnetic (EM) probes mandates the need for a low-overhead solution to protect EM side-channel analysis (SCA) attacks. This work, for the first time, performs a white-box analysis to root-cause the origin of the EM leakage from an integrated circuit. System-level EM simulations with Intel 32 nm CMOS technology interconnect stack, as an example, reveals that the EM leakage from metals above layer 8 can be detected by an external non-invasive attacker with the commercially available state-of-the-art EM probes. Equipped with this ‘white-box’ understanding, this work proposes STELLAR: Signature aTtenuation Embedded CRYPTO with Low-Level metAl Routing, which is a two-stage solution to eliminate the critical signal radiation from the higher-level metal layers. Firstly, we propose routing the entire cryptographic core within the local lower-level metal layers, whose leakage cannot be picked up by an external attacker. Then, the entire crypto IP is embedded within a Signature Attenuation Hardware (SAH) which in turn suppresses the critical encryption signature before it routes the current signature to the highly radiating top-level metal layers. System-level implementation of the STELLAR hardware with local lower-level metal routing in TSMC 65 nm CMOS technology, with an AES-128 encryption engine (as an example cryptographic block) operating at 40 MHz, shows that the system remains secure against EM SCA attack even after 1M encryptions, with 67% energy efficiency and 1.23× area overhead compared to the unprotected AES.","PeriodicalId":146928,"journal":{"name":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"48","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HST.2019.8740839","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 48

Abstract

The threat of side-channels is becoming increasingly prominent for resource-constrained internet-connected devices. While numerous power side-channel countermeasures have been proposed, a promising approach to protect the non-invasive electromagnetic side-channel attacks has been relatively scarce. Today’s availability of high-resolution electromagnetic (EM) probes mandates the need for a low-overhead solution to protect EM side-channel analysis (SCA) attacks. This work, for the first time, performs a white-box analysis to root-cause the origin of the EM leakage from an integrated circuit. System-level EM simulations with Intel 32 nm CMOS technology interconnect stack, as an example, reveals that the EM leakage from metals above layer 8 can be detected by an external non-invasive attacker with the commercially available state-of-the-art EM probes. Equipped with this ‘white-box’ understanding, this work proposes STELLAR: Signature aTtenuation Embedded CRYPTO with Low-Level metAl Routing, which is a two-stage solution to eliminate the critical signal radiation from the higher-level metal layers. Firstly, we propose routing the entire cryptographic core within the local lower-level metal layers, whose leakage cannot be picked up by an external attacker. Then, the entire crypto IP is embedded within a Signature Attenuation Hardware (SAH) which in turn suppresses the critical encryption signature before it routes the current signature to the highly radiating top-level metal layers. System-level implementation of the STELLAR hardware with local lower-level metal routing in TSMC 65 nm CMOS technology, with an AES-128 encryption engine (as an example cryptographic block) operating at 40 MHz, shows that the system remains secure against EM SCA attack even after 1M encryptions, with 67% energy efficiency and 1.23× area overhead compared to the unprotected AES.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
恒星:一种通过接地根本原因分析的通用电磁侧通道攻击保护
对于资源受限的互联网连接设备,侧信道的威胁变得越来越突出。虽然已经提出了许多功率侧信道对抗措施,但一种有希望保护非侵入性电磁侧信道攻击的方法相对较少。当今高分辨率电磁(EM)探针的可用性要求需要低开销的解决方案来保护EM侧信道分析(SCA)攻击。这项工作首次对集成电路电磁泄漏的根源进行了白盒分析。以采用英特尔32纳米CMOS技术互连堆栈的系统级电磁仿真为例,结果表明,外部非侵入性攻击者可以使用市面上最先进的电磁探头检测到第8层以上金属的电磁泄漏。有了这种“白盒”理解,这项工作提出了恒星:低水平金属路由的签名衰减嵌入式加密,这是一个两阶段的解决方案,用于消除来自较高水平金属层的关键信号辐射。首先,我们建议将整个加密核心路由到本地较低级别的金属层中,其泄漏不能被外部攻击者捕获。然后,将整个加密IP嵌入签名衰减硬件(SAH)中,该硬件在将当前签名路由到高度辐射的顶层金属层之前依次抑制关键加密签名。采用台积电65nm CMOS技术的本地低级金属路由的恒星硬件的系统级实现,使用工作在40mhz的AES-128加密引擎(作为示例加密块),表明即使在1M加密后,系统仍然可以安全抵御EM SCA攻击,与未受保护的AES相比,具有67%的能效和1.23倍的面积开销。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Securing AES against Localized EM Attacks through Spatial Randomization of Dataflow A Statistical Fault Analysis Methodology for the Ascon Authenticated Cipher High Capability and Low-Complexity: Novel Fault Detection Scheme for Finite Field Multipliers over GF(2m) based on MSPB RATAFIA: Ransomware Analysis using Time And Frequency Informed Autoencoders Detecting Recycled SoCs by Exploiting Aging Induced Biases in Memory Cells
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1