2014 IEEE International Symposium on Electromagnetic Compatibility (EMC) 2014
DOI: 10.1109/isemc.2014.6899068
|View full text |Cite
|
Sign up to set email alerts
|

Integrated-circuit countermeasures against information leakage through EM radiation

Abstract: EM radiation from a cryptographic processor IC contains side-channel information of secret data hidden inside the chip. This side-channel information leakage is a potential threat critical to our information society. This paper introduces several circuit-level countermeasures integrated with the cryptographic processor core for advanced hardware security.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…As countermeasures against such attacks, specific circuit techniques have been developed to detect unintended EM wave propagation within devices [72], [73], and EMC countermeasures [74], [75] can be implemented either inside or outside of devices to suppress EM wave propagation that can cause security degradation.…”
Section: Security Degradation By Intentional Em Interferencementioning
confidence: 99%
“…As countermeasures against such attacks, specific circuit techniques have been developed to detect unintended EM wave propagation within devices [72], [73], and EMC countermeasures [74], [75] can be implemented either inside or outside of devices to suppress EM wave propagation that can cause security degradation.…”
Section: Security Degradation By Intentional Em Interferencementioning
confidence: 99%
“…Another involved applying random numbers to processed information to scramble the information contained in the radiated electromagnetic waves [12]. Controlling the impedance between the IC and circuit board to prevent information leakage outside an IC was proposed in [13], as another countermeasure.…”
Section: Unintentional Electromagnetic Emissionmentioning
confidence: 99%
“…Effective techniques to counter this type of attack include implementing of a circuit that detects the propagation of unintentional electromagnetic waves inside equipment [20], and achieving EMC within and outside the equipment to prevent propagation of electromagnetic waves [13,21].…”
Section: Intentional Electromagnetic Interferencementioning
confidence: 99%
“…Some means of attacks such as invasive attacks, semi-invasive attacks and non-invasive attacks have been researched in the last several years. Corresponding countermeasures have also been developed by researchers all over the world [2,3,4,5]. However, existing protective techniques mainly focus on chip-level protection and few studies pay attention to system-level protection as primary safeguards.…”
Section: Introductionmentioning
confidence: 99%