2019 IEEE 37th VLSI Test Symposium (VTS) 2019
DOI: 10.1109/vts.2019.8758600
|View full text |Cite
|
Sign up to set email alerts
|

RTL-PSC: Automated Power Side-Channel Leakage Assessment at Register-Transfer Level

Abstract: Power side-channel attacks (SCAs) have become a major concern to the security community due to their noninvasive feature, low-cost, and effectiveness in extracting secret information from hardware implementation of cryto algorithms. Therefore, it is imperative to evaluate if the hardware is vulnerable to SCAs during its design and validation stages. Currently, however, there is little known effort in evaluating the vulnerability of a hardware to SCAs at early design stage. In this paper, we propose, for the fi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(4 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Power-based SCA exploits the vulnerability that different inputs to a cryptographic system will produce different power consumption patterns. The Test Vector Leakage Assessment (TVLA) methodology, demonstrated in [22], [25], is used to verify whether this vulnerability exists in the IMC implementation also or not by analyzing side-channel leakage statistics. So, if different inputs to the system always result in a similar power consumption pattern on average, there is nothing for an attacker to exploit.…”
Section: A Power Side Channel Leakage Assessment Methodologymentioning
confidence: 99%
“…Power-based SCA exploits the vulnerability that different inputs to a cryptographic system will produce different power consumption patterns. The Test Vector Leakage Assessment (TVLA) methodology, demonstrated in [22], [25], is used to verify whether this vulnerability exists in the IMC implementation also or not by analyzing side-channel leakage statistics. So, if different inputs to the system always result in a similar power consumption pattern on average, there is nothing for an attacker to exploit.…”
Section: A Power Side Channel Leakage Assessment Methodologymentioning
confidence: 99%
“…The Kullback-Leibler test does not assume normality of the data, although it does have its own assumptions on the support of the data. This application of statistical testing is with regard to Register-Transfer Level (RTL) leakage exploitation-based attacks [18][19][20]. On the contrary, this work primarily focuses on leakage detection, leading to the exploration of alternate statistical methods.…”
Section: Related Workmentioning
confidence: 99%
“…The main drawback for ACA and PARAM is that they are closed-source projects, and while CASCADE claims to be open source it relies on commercial EDA tools such as PrimeTime by Synopsys. RTL-PSC [He+19] is a tool similar in functionality, however it only requires the RTL specification of the circuit. This system also relies on proprietary software, in particular VCS by Synopsys.…”
Section: State Of the Artmentioning
confidence: 99%