2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2019
DOI: 10.1109/hst.2019.8740839
|View full text |Cite
|
Sign up to set email alerts
|

STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 44 publications
(30 citation statements)
references
References 27 publications
0
30
0
Order By: Relevance
“…Logical and architectural countermeasures are design-specific, while the physical circuit-level countermeasures are generic to any crypto implementation. Our work on signature attenuation with local lower metal routing has evolved over the years, starting with attenuated signature noise injection (ASNI) [18,19], moving on to STELLAR (signature attenuation embedded crypto with low-level metal routing) [20,21] and finally reaching the chip-level implementation on a form of CDSA (current domain signature attenuation) [22].…”
Section: State-of-the-art Countermeasuresmentioning
confidence: 99%
See 3 more Smart Citations
“…Logical and architectural countermeasures are design-specific, while the physical circuit-level countermeasures are generic to any crypto implementation. Our work on signature attenuation with local lower metal routing has evolved over the years, starting with attenuated signature noise injection (ASNI) [18,19], moving on to STELLAR (signature attenuation embedded crypto with low-level metal routing) [20,21] and finally reaching the chip-level implementation on a form of CDSA (current domain signature attenuation) [22].…”
Section: State-of-the-art Countermeasuresmentioning
confidence: 99%
“…IVRs using buck converters and series LDOs have been explored extensively; however, they suffer from large passives-inductors and on-chip capacitors. As we will discuss later, these on-chip MIM (metal-insulator-metal) capacitors can leak critical side-channel information through the higher-level metal layers in the form of EM leakage [20,22]. Additionally, a series LDO-based implementation inherently leaks critical correlated information [19], as it instantaneously tracks the voltage fluctuations across the crypto core and regulates the current accordingly.…”
Section: Circuit-level Physical Countermeasuresmentioning
confidence: 99%
See 2 more Smart Citations
“…Such attacks have been shown to be capable of actually extracting secret key information, as in [2] and [3]. These EM emissions originate from current consumption of an IC running cryptographic algorithms, which while flowing through the metal layers of an IC cause EM radiation as described in [4]. The EM emissions can either be caused by key-dependent operations or other operations.…”
Section: Introductionmentioning
confidence: 99%