2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST) 2016
DOI: 10.1109/asianhost.2016.7835563
|View full text |Cite
|
Sign up to set email alerts
|

Key extraction from the primary side of a switched-mode power supply

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…Both signals separately had low-noise but the interference reduced the SNR of the signal of interest. As the interference contained overlapping frequencies with the signal of interest, a wavelet based detrending scheme, as used in [39], provided an effective and efficient approach for separation. After trying various wavelets, ones with a lower number of vanishing moments provided better results, indicating the need for a fast response to sudden changes in the interference [15,41].…”
Section: Experimental Outlinementioning
confidence: 99%
“…Both signals separately had low-noise but the interference reduced the SNR of the signal of interest. As the interference contained overlapping frequencies with the signal of interest, a wavelet based detrending scheme, as used in [39], provided an effective and efficient approach for separation. After trying various wavelets, ones with a lower number of vanishing moments provided better results, indicating the need for a fast response to sudden changes in the interference [15,41].…”
Section: Experimental Outlinementioning
confidence: 99%
“…The question of band-limited and noisy measurements being successful in attacking symmetric algorithms was demonstrated by Saab et al [SLT16]. The work of Sabb et al is highly relevant to our work, as Saab et al perform an attack against AES on the supply side of a switch-mode power supply.…”
Section: Cross-domain Power Analysis Attacksmentioning
confidence: 89%
“…It can be seen that while some entropy reduction was achieved, the overall results did not fully recover the key in 240 × 10 6 traces. The work in Saab et al [SLT16] successfully recovered a power trace from a switch-mode power supply, although the specific techniques from Saab et al also solve jitter problems that are not present in our captures.…”
Section: On-board Regulator Modementioning
confidence: 97%
“…Hence, the EM emissions from inductors in IVR are likely to more strongly interfere with EM emissions from the processors. Therefore, although off-chip VRs have shown to have little effect in reducing information leakage from the processor (in fact, in certain cases, off-chip VRs have shown to be a major source of leakage [30]), the same conclusion cannot be drawn for on-chip VRs. This paper for the first time presents an in-depth measurement and characterization of the effect of IVR on EM leakage from SoCs.…”
Section: Motivation and Contributionmentioning
confidence: 99%