2019 IEEE 25th International Symposium on on-Line Testing and Robust System Design (IOLTS) 2019
DOI: 10.1109/iolts.2019.8854458
|View full text |Cite
|
Sign up to set email alerts
|

PASCAL: Timing SCA Resistant Design and Verification Flow

Abstract: A large number of crypto accelerators are being deployed with the widespread adoption of IoT. It is vitally important that these accelerators and other security hardware IPs are provably secure. Security is an extra functional requirement and hence many security verification tools are not mature. We propose an approach/flow -PASCAL -that works on RTL designs and discovers potential Timing Side Channel Attack (SCA) vulnerabilities in them. Based on information flow analysis, this is able to identify Timing Disp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…The power traces are represented by changes of power over time, with the timing information embedded. A similar approach is used in [15] for RTL verification of RSA designs against vulnerability to timing SCAs.…”
Section: B Attack Assumptionsmentioning
confidence: 99%
“…The power traces are represented by changes of power over time, with the timing information embedded. A similar approach is used in [15] for RTL verification of RSA designs against vulnerability to timing SCAs.…”
Section: B Attack Assumptionsmentioning
confidence: 99%