2018
DOI: 10.1109/tvlsi.2017.2762630
|View full text |Cite
|
Sign up to set email alerts
|

The Low Area Probing Detector as a Countermeasure Against Invasive Attacks

Abstract: Abstract-Microprobing allows intercepting data from onchip wires as well as injecting faults into data or control lines. This makes it a commonly used attack technique against security-related semiconductors, such as smart card controllers. We present the low area probing detector (LAPD) as an efficient approach to detect microprobing. It compares delay differences between symmetric lines such as bus lines to detect timing asymmetries introduced by the capacitive load of a probe. Compared with state-of-the-art… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(13 citation statements)
references
References 17 publications
(28 reference statements)
0
11
0
Order By: Relevance
“…Additionally, compared with the unified PUF and TRNG design based on CMOS technology, the intrinsic variations of RRAM in write power and latency increase the difficulty in analyzing the system performance and stealing privacy information by side-channel attack such as differential power attack [34]. For practical applications, probing detection technique [35], power-stable code [36], and compact masking technique [37] can be applied to counter either invasive physical attacks or noninvasive attacks. Therefore, even if a malicious party gets hold of the device, it is very hard to steal the PUF ID from the proposed RRAM-based security module.…”
Section: Discussionmentioning
confidence: 99%
“…Additionally, compared with the unified PUF and TRNG design based on CMOS technology, the intrinsic variations of RRAM in write power and latency increase the difficulty in analyzing the system performance and stealing privacy information by side-channel attack such as differential power attack [34]. For practical applications, probing detection technique [35], power-stable code [36], and compact masking technique [37] can be applied to counter either invasive physical attacks or noninvasive attacks. Therefore, even if a malicious party gets hold of the device, it is very hard to steal the PUF ID from the proposed RRAM-based security module.…”
Section: Discussionmentioning
confidence: 99%
“…Rahman et al [23] investigated hardware security technologies based on complementary metal-oxidesemiconductors (CMOSs) and analyzed their response coverage for attacks. Weiner et al [24] and Weiner et al [25] proposed a low-area probing detector as a response to micro-probing security threats and compared it with shield or bus encryption methods in terms of area overhead and latency. Lee et al proposed [26] a robust secure shield structure to respond to invasive attacks, such as focused ion beam (FIB) circuit editing.…”
Section: A Hardware Securitymentioning
confidence: 99%
“…Weiner et al [24] and Weiner et al [25] proposed a low-area probing detector as a response to micro-probing security threats Lee et al proposed [26] a robust secure shield structure to respond to invasive attacks Semi-invasive attack Rahman et al [23] using complementary metal-oxide-semiconductors (CMOSs)…”
Section: Attack Type Countermeasures Invasive Attackmentioning
confidence: 99%
“…Semi-or fully-invasive probing, monitoring, fault injection, or even circuit modifications are arguably the most severe threats for hardware security at runtime. Related attacks and various countermeasures have been demonstrated for classical 2D ICs, e.g., see [32], [33], [34] and [35], [36], [37], [38].…”
Section: B Probing Monitoring or Circuit Modification Attacksmentioning
confidence: 99%