2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) 2019
DOI: 10.1109/iccad45719.2019.8942173
|View full text |Cite
|
Sign up to set email alerts
|

Karna: A Gate-Sizing based Security Aware EDA Flow for Improved Power Side-Channel Attack Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(7 citation statements)
references
References 29 publications
0
7
0
Order By: Relevance
“…After investigation, it appears that in some cases, the processor stalls for one cycle, which is not taken into account in our model. While we have not yet found out the reason why Key [12] ^ Key [15] (ex0) Key [12] ^ Key [14] (ex1) Key [14] ^ Key [15] (ex2) SBox[Key [12]] (ex3) SBox[Key [14]] (ex4) SBox[Key [15]] (ex5) SBox[Key [12]] ^ SBox[Key [15]] (ex6) SBox[Key [14]] ^ SBox[Key [15]] (ex7) Fig. 9.…”
Section: Accuracy and Exploitabilitymentioning
confidence: 85%
See 2 more Smart Citations
“…After investigation, it appears that in some cases, the processor stalls for one cycle, which is not taken into account in our model. While we have not yet found out the reason why Key [12] ^ Key [15] (ex0) Key [12] ^ Key [14] (ex1) Key [14] ^ Key [15] (ex2) SBox[Key [12]] (ex3) SBox[Key [14]] (ex4) SBox[Key [15]] (ex5) SBox[Key [12]] ^ SBox[Key [15]] (ex6) SBox[Key [14]] ^ SBox[Key [15]] (ex7) Fig. 9.…”
Section: Accuracy and Exploitabilitymentioning
confidence: 85%
“…Also, when the patching fails, developers are left clueless with the leakage, advocating for a solution able to explain it. On the hardware side, the usage of dedicated logic or design tools can help reduce the sources of potential leakage [12], [13]. Such design-time solutions do not help for existing processors.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The use of CAD tools for gate-level simulation is adopted in ACA [16] and Karna [13]. ACA finds the leaky gates in the gate-level netlist and replaces them locally with hardened structures.…”
Section: Related Workmentioning
confidence: 99%
“…For example, the popular algorithmic masking scheme [175] results in over 3× of performance degradation. In the recent years, the need for incorporating security countermeasures in low-cost embedded hardware has motivated the emergence of efficient countermeasures like [176]- [178], where the algorithms available in the commercial EDA flows are leveraged to reduce area and delay overheads of these countermeasures.…”
Section: Side Channel Protection Techniquesmentioning
confidence: 99%