22nd International Conference on Field Programmable Logic and Applications (FPL) 2012
DOI: 10.1109/fpl.2012.6339235
|View full text |Cite
|
Sign up to set email alerts
|

Detecting power attacks on reconfigurable hardware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 5 publications
0
13
0
Order By: Relevance
“…2) Potential use-cases: RO-based sensors have been widely adopted for voltage and temperature monitoring [11], attack detection [23] and more recently side-channel attacks [8]. Our novel RO-based sensor has been shown suitable for statistical side-channel attacks and could be used to improve the previous applications.…”
Section: B Side-channel Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…2) Potential use-cases: RO-based sensors have been widely adopted for voltage and temperature monitoring [11], attack detection [23] and more recently side-channel attacks [8]. Our novel RO-based sensor has been shown suitable for statistical side-channel attacks and could be used to improve the previous applications.…”
Section: B Side-channel Resultsmentioning
confidence: 99%
“…Hence, it provides an image of the power supply consumption. To enable the measurement of the RO oscillation frequency, designers commonly adopt digital counters [8,23]. A counter C RO is connected to the RO output: it is incremented by the RO oscillations and is read out by a register at a fixed sampling frequency f s .…”
Section: Delay Sensors: Ring Oscillator Based Sensormentioning
confidence: 99%
See 1 more Smart Citation
“…Thus it is better suited for sensing static effects or slow transients. By combining multiple oscillators, it may be feasible to achieve rates such as 8MSPS [15], but a sample period of 125ns is still far too slow for detecting and reacting to nanosecond-scale effects.…”
Section: Related Workmentioning
confidence: 99%
“…This method was shown to be susceptible to power analysis attacks when used without countermeasures [6]. There are many proposed countermeasures against power analysis attacks in FPGAs, one example is the system proposed in [7], where an internal circuitry is used to monitor the power supply voltage to detect possible insertion of power measurement circuits onto the device's power rail. Another solution is proposed in [8].…”
Section: Introductionmentioning
confidence: 98%