2020 30th International Conference on Field-Programmable Logic and Applications (FPL) 2020
DOI: 10.1109/fpl50879.2020.00041
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Side-Channel Protection using Dynamic Clock Randomization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(7 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…Additionally, small batch sizes have an intrinsic influence on regularisation and can be as a result of noise effects in the learning process. A very low learning rate (0.001 or less) is required for very small batch sizes to maintain stability [21].…”
Section: Training Accuracymentioning
confidence: 99%
“…Additionally, small batch sizes have an intrinsic influence on regularisation and can be as a result of noise effects in the learning process. A very low learning rate (0.001 or less) is required for very small batch sizes to maintain stability [21].…”
Section: Training Accuracymentioning
confidence: 99%
“…Due to their nature, such attacks take the name Side-Channel Attacks (SCAs), and Figure 3 SCAs are widely documented in the literature and constitute one of the hottest topics in the cybersecurity field. An exhaustive and systematic review of SCAs can be found in [44][45][46], while [47][48][49][50][51][52][53][54][55][56][57][58][59][60][61][62][63] report several examples of the most diffused categories of attacks that exploit the physical implementation of a device, which are listed below:…”
Section: Rotmentioning
confidence: 99%
“…Power analysis [53][54][55][56][57][58][59][60][61]64,65]: This family of attacks is one of the most effective on both hardware and software implementations, and it exploits the power consumption of underlying physical circuits. Concerning the software case, if each opcode of the instruction set architecture can be associated with a different and specific power trace shape, then the series of operations performed by a routine is revealed; on the hardware side, data dependencies over different power traces can be analyzed to recover secret information.…”
mentioning
confidence: 99%
“…The frequency of the clock signal directly influences the power dissipation of a circuit. Thus, several works in the literature explore this strategy in different ways as recently Jayasinghe et al [56], Hettwer et al [57]. These approaches exploit the configurable clock management available in FPGAs to dynamically generate clock signals with a large frequency spectrum.…”
Section: B Hiding: Random Consumptionmentioning
confidence: 99%