2010 IEEE International Symposium on Electromagnetic Compatibility 2010
DOI: 10.1109/isemc.2010.5711255
|View full text |Cite
|
Sign up to set email alerts
|

Development of an on-chip micro shielded-loop probe to evaluate performance of magnetic film to protect a cryptographic LSI from electromagnetic analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…This creates a danger in exposing the critical section of the code which can be exploited in different ways to gain advantage. For example, the memory bus can be probed to retrieve the secret keys if the adversary knows the exact position 254 of encryption; 3), At present, powerful magnetic probes are utilized to perform electro-magnetic side channel attacks [14], which are similar to power analysis. Such a probe can be placed on top of the original core, executing the cryptographic program, which will then result in a successful DPA.…”
Section: Rel Ated Workmentioning
confidence: 99%
“…This creates a danger in exposing the critical section of the code which can be exploited in different ways to gain advantage. For example, the memory bus can be probed to retrieve the secret keys if the adversary knows the exact position 254 of encryption; 3), At present, powerful magnetic probes are utilized to perform electro-magnetic side channel attacks [14], which are similar to power analysis. Such a probe can be placed on top of the original core, executing the cryptographic program, which will then result in a successful DPA.…”
Section: Rel Ated Workmentioning
confidence: 99%
“…Power consumption is typically modelled by estimating the number of '1's in a register via a Hamming weight or Hamming distance power model. Several differing methods of statistically comparing the modelled versus measured power consumptions are commonly used, such as difference of means, distance of means and Pearson's correlation coefficient [26].…”
Section: Power Analysis Attacksmentioning
confidence: 99%
“…Specific countermeasures proposed against EM SCA include signal strength reduction techniques like shielding or signal information reduction using noise insertion [17]. However, data randomization with noise injection comes with significant power overheads, and EM shielding incurs high cost of packaging [22] and is not a practical solution for most applications. To the best of the authors' knowledge, none of these works have thoroughly investigated the root-cause of the EM leakage in a cryptographic IC.…”
Section: A Literature Review: Black Box Approachmentioning
confidence: 99%