2016
DOI: 10.1049/iet-cds.2016.0010
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of a decoupling based power analysis attack countermeasure

Abstract: This study presents new prototyped evaluation results for the authors' proposed power analysis attack countermeasure architecture based on decoupling individual sensitive modules with low current consumption. The proposed architecture includes a switch box module to randomise internal connections, mixing residual information that may leak through non-ideal switch elements and uneven charge cycles. The two implementations evaluated are a printed circuit board (PCB) developed using stand-alone CMOS components an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…PUFs are also classified into strong and weakbased on their immunity from the modeling attacks. In today's computational measures, a strong PUF should be non-memory-based with at least 2 64 CRPs [39].…”
Section: ) Mixed-signal Pufsmentioning
confidence: 99%
See 1 more Smart Citation
“…PUFs are also classified into strong and weakbased on their immunity from the modeling attacks. In today's computational measures, a strong PUF should be non-memory-based with at least 2 64 CRPs [39].…”
Section: ) Mixed-signal Pufsmentioning
confidence: 99%
“…In these attacks, an attacker analyzes a large number of power traces of the chip to discern its inward function. Decoupling capacitors can oppose such attacks [64]- [68].…”
Section: ) Non-invasive Attacksmentioning
confidence: 99%
“…Stealth spam attacks can abuse the fact that many connections that are formed do not tell the network that they are closing [11]. Thus an attacker can use a connection made by the victim that the network still thinks is open, even though the phone had closed it.…”
Section: Related Workmentioning
confidence: 99%