2008
DOI: 10.1109/tdsc.2007.70234
|View full text |Cite
|
Sign up to set email alerts
|

High-Level Side-Channel Attack Modeling and Simulation for Security-Critical Systems on Chips

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…Concerning the simulation of an IC's EM side-channel radiation, a few papers have put forward some ideas using Hamming Distance, Hamming Weight or improved models [9]. The existing models have several drawbacks, including not scalable for very large designs, not considering real hardware implementations, etc.…”
Section: Rtl Em Side Channel Radiation Modelmentioning
confidence: 99%
“…Concerning the simulation of an IC's EM side-channel radiation, a few papers have put forward some ideas using Hamming Distance, Hamming Weight or improved models [9]. The existing models have several drawbacks, including not scalable for very large designs, not considering real hardware implementations, etc.…”
Section: Rtl Em Side Channel Radiation Modelmentioning
confidence: 99%
“…Another important research direction is that of designing tools for high-level side-channel attack simulation developed with the aim of automating analysis techniques to help a cryptanalyst identify possible implementation vulnerabilities with minimal effort on their side. In [22], an approach is presented based on the SystemC 2.0 language [1], the de facto standard in complex digital system simulations illustrated by a case study of analyzing various implementations of AES [23] algorithm.…”
Section: Software Tools For Cryptanalysismentioning
confidence: 99%
“…Only recently, systematic methods support design for trust and security have been described in literature [5].Menichelli et. al present an exploration approach centered on high level simulation based on SystemC to suggest improvements in the knowledge and identification of the weaknesses in cryptographic algorithm implementations [6]. Ardeshiricham et.…”
Section: Introductionmentioning
confidence: 99%