2022
DOI: 10.1109/tvlsi.2021.3073946
|View full text |Cite
|
Sign up to set email alerts
|

Physical Attack Protection Techniques for IC Chip Level Hardware Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 24 publications
(9 citation statements)
references
References 88 publications
(66 reference statements)
0
9
0
Order By: Relevance
“…We recommend watch developers to activate flash memory protection functions offered by the microcontroller manufacturer to protect sensitive data from straightforward memory dump through debug interface. To protect against invasive data extraction, we recommend backside shielding [17], [18] or sensing techniques [19] to deter invasive sample preparation.…”
Section: Discussionmentioning
confidence: 99%
“…We recommend watch developers to activate flash memory protection functions offered by the microcontroller manufacturer to protect sensitive data from straightforward memory dump through debug interface. To protect against invasive data extraction, we recommend backside shielding [17], [18] or sensing techniques [19] to deter invasive sample preparation.…”
Section: Discussionmentioning
confidence: 99%
“…This translates into at least five to six orders of magnitude heavier attack effort [91], [92], as evidence of the effectiveness of physical-level counteraction. As an alternative approach to be used when routing discipline is not acceptable, active techniques for EM probe detection have also been demonstrated [93]. In detail, the EM probe detection circuit in [94] is based on a fully-digital sensor circuit with reference-free dual-coil sensing, as well as a ring-oscillator-based sensor calibration with percentage point-range area overhead and intermittent operation for lower power.…”
Section: On-chip Sensorization For Non-invasive Physical Attack Detec...mentioning
confidence: 99%
“…On the Why SC leakages are observable from the Si backsideits answer is explained with a general sketch of a power delivery network (PDN) system shown in Fig. 5 [21]. An external power source supplies an IC chip, where power lines are in series connected through PCBs, packages, and IC chips.…”
Section: Attack Surfaces -Power and Em Sc Leakagesmentioning
confidence: 99%