High-level synthesis design flow for power side-channel security

被引:0
作者
Zhang L. [1 ]
Mu D. [1 ]
Hu W. [1 ]
Tai Y. [1 ]
机构
[1] School of Cybersecurity, Northwestern Polytechnical University, Xi'an
来源
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University | 2020年 / 47卷 / 04期
关键词
Cypher device; Hardware design; High-level synthesis; Information leakage; Power side-channel;
D O I
10.19665/j.issn1001-2400.2020.04.009
中图分类号
学科分类号
摘要
The lack of efficient security guidance is a prominent problem in the design flow of high-level synthesis. To tackle this issue, this paper proposes a security-based high-level synthesis design flow featuring the power side-channel vulnerabilities. The side-channel leakage is quantified by establishing a secure component module library, a more efficient and secure parallel scheduling mechanism is generated by optimizing the control flow, and a more secure architecture of the storage system is achieved by optimizing the data flow. The goal is to perform tradeoffs between performance and security, reducing the side-channel risks at the early stage of design and simultaneously generating more secure and efficient cryptographic cores in hardware. Furthermore, the proposed HLS design flow is verified on a field programmable gate array platform. Experimental results show that, in comparison with the traditional design flow, this method reduces the resources by 72% and the clock cycles by 70% and increases the throughput by 88%, and that it can lower the power side-channel risks within an ongoing design to the greatest extent. © 2020, The Editorial Board of Journal of Xidian University. All right reserved.
引用
收藏
页码:64 / 69
页数:5
相关论文
共 15 条
[1]  
MAO Baolei, MU Dejun, HU Wei, Et al., Quantitative Analysis of Sliding Windows Attack for the RSA Timing Channel, Journal of Xidian University, 44, 5, pp. 114-120, (2017)
[2]  
QIN Maoyuan, MU Dejun, HU Wei, Et al., Fine-granularity Gate Level Formal Verification Method for Hardware Security, Journal of Xidian University, 45, 5, pp. 143-148, (2018)
[3]  
OPPERMANN J, SOMMER L, WEBER L, Et al., SkyCastle: a Resource-aware Multi-loop Scheduler for High-level Synthesis, Proceedings of the 2019 International Conference on Field-Programmable Technology, pp. 1-9, (2019)
[4]  
GARCIA P, BHOWMIK D, STEWART R, Et al., Optimized Memory Allocation and Power Minimization for FPGA-based Image Processing, Journal of Imaging, 5, 1, pp. 701-723, (2019)
[5]  
GIAMBLANCO N V, ANDERSON J H., A Dynamic Memory Allocation Library for High-level Synthesis, Proceedings of the 2019 29th International Conference on Field-Programmable Logic and Applications, pp. 314-320, (2019)
[6]  
CHOI Y K, CONG J., HLS-based Optimization and Design Space Exploration for Applications with Variable Loop Bounds, Proceedings of the 2018 IEEE/ACM International Conference on Computer-Aided Design, (2018)
[7]  
KANEWALA U, GAMLATH K, RAMANAYAKE H, Et al., Power-aware High-level Synthesis Flow for Mapping FPGA Designs, Proceedings of the 2019 5th International Multidisciplinary Moratuwa Engineering Research Conference, pp. 228-233, (2019)
[8]  
SICHANI A S, MORENO W A., Mathematical Model for Glitch Power Consumption to Study Its Implication on Power Analysis Attacks, Proceedings of the 2018 9th Latin American Symposium on Circuits & Systems, pp. 1-4, (2018)
[9]  
PEETERS E, STANDAERT F X, QUISQUATER J J., Power and Electromagnetic Analysis: Improved Model, Consequences and Comparisons, Elsevier Integration the Very Large Scale Integration Journal, 40, 1, pp. 52-60, (2007)
[10]  
SCIONTI A, CICCIA S, TERZO O, Et al., Chip-to-cloud: An Autonomous and Energy Efficient Platform for Smart Vision Applications, Proceedings of the 2019 Design, Automation and Test in Europe Conference and Exhibition, pp. 492-497, (2019)