Proceedings of the 18th ACM Great Lakes Symposium on VLSI 2008
DOI: 10.1145/1366110.1366176
|View full text |Cite
|
Sign up to set email alerts
|

A linear programming formulation for security-aware gate sizing

Abstract: Differential power analysis (DPA) has been shown to be the dominant type of side-channel attacks that significantly jeopardize the security in integrated circuits. It has been shown that the data, the functional unit operations as well as the internal micro-architectures can be detected through current and power analysis. Subsequently, different CMOS logic styles have been proposed in the literature for performing computations in such a manner that the current and power signatures can be concealed through redu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…There are at least three methodologies for security aware sizing. Bhattacharya et al [34] formulate the sizing problem considering the switching activity of the transistors and the capacitances of each interconnection node of the circuit. In 2009 [35], Lin and Burleson developed an iterative algorithm to resize the higher capacitances gates of the circuit.…”
Section: A Hiding: Uniform Consumptionmentioning
confidence: 99%
“…There are at least three methodologies for security aware sizing. Bhattacharya et al [34] formulate the sizing problem considering the switching activity of the transistors and the capacitances of each interconnection node of the circuit. In 2009 [35], Lin and Burleson developed an iterative algorithm to resize the higher capacitances gates of the circuit.…”
Section: A Hiding: Uniform Consumptionmentioning
confidence: 99%
“…The goal of data security is to protect the integrity and privacy of confidential data from attacks. Much work on data security, such as XOM [Lie et al 2000]; AEGIS [Suh et al 2005]; SENSS [Zhang et al 2005]; split mask countermeasure [Gebotys 2006]; WDDL [Tiri and Verbauwhede 2006]; security-aware gate sizing [Bhattacharya and Ranganathan 2008]; and TPM [TCG 2006]; protects private keys.…”
Section: Security Aspectsmentioning
confidence: 99%
“…The most widely known is the logical effort method [2], which provides fast heuristics or design guidelines for solving the gate-sizing problem approximately. In [3] and [4], Linear Programming is used. NonLinear Programming is used in [5] and [6].…”
Section: Introductionmentioning
confidence: 99%