2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2019
DOI: 10.1109/isvlsi.2019.00016
|View full text |Cite
|
Sign up to set email alerts
|

Transient Effect Ring Oscillators Leak Too

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…Tebelmann et al proposed to used the signal-to-noise ratio (SNR) to estimate the duration of the TERO oscillation and then estimate the number of oscillation before than the TERO oscillations stop [13]. It is an efficient method but Mureddu et al proven that the same results can be directly obtain by using a real-time spectral analyzer and moreover they proposed a full methodology to clone the TERO [14]. Fig.…”
Section: Side Channel Analysis On Pufmentioning
confidence: 99%
See 2 more Smart Citations
“…Tebelmann et al proposed to used the signal-to-noise ratio (SNR) to estimate the duration of the TERO oscillation and then estimate the number of oscillation before than the TERO oscillations stop [13]. It is an efficient method but Mureddu et al proven that the same results can be directly obtain by using a real-time spectral analyzer and moreover they proposed a full methodology to clone the TERO [14]. Fig.…”
Section: Side Channel Analysis On Pufmentioning
confidence: 99%
“…Moreover, for protection against side channel analysis it is more efficient to generate correlated noise on the side channel to be not remove by differential analysis as proposed in [19] for cypher implementation. To do it, a possible way could be to use the intrinsic locking of oscillating cells study in [14]. Finally, an efficient solution would be to not allow the user to access directly to the challenges.…”
Section: Ring-based Puf Protection Against Physical Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, a problem of many RO-based TRNGs and PUFs is that active attacks that inject electromagnetic signals can synchronize temporarily the ROs, which is known as locking phenomenon. The consequence is a statistically manipulated output in TRNGs and a denial-of-service (DoS) in PUFs [19]- [20]. One major issue for PUFs is that efficient methods based on side-channel passive attacks have been reported to clone RO-PUFs and TERO-PUFs, breaking their security [20].…”
Section: Introductionmentioning
confidence: 99%
“…The consequence is a statistically manipulated output in TRNGs and a denial-of-service (DoS) in PUFs [19]- [20]. One major issue for PUFs is that efficient methods based on side-channel passive attacks have been reported to clone RO-PUFs and TERO-PUFs, breaking their security [20].…”
Section: Introductionmentioning
confidence: 99%