Automatic On-Chip Clock Network Optimization for Electromagnetic Side-Channel Protection

被引:3
作者
Ma, Haocheng [1 ]
He, Jiaji [2 ]
Panoff, Max [3 ]
Jin, Yier [3 ]
Zhao, Yiqiang [1 ]
机构
[1] Tianjin Univ, Sch Microelect, Tianjin 300072, Peoples R China
[2] Tsinghua Univ, Inst Microelect, Beijing 100084, Peoples R China
[3] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
关键词
Clocks; Security; Tools; Hardware; Integrated circuits; Measurement; Pins; CAD for security; side-channel attack; electromagnetic leakage; power side channel; clock tree synthesis; DESIGN; FLOW;
D O I
10.1109/JETCAS.2021.3077842
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Commercial electronic design automation (EDA) tools typically focus on optimizing the power, area, and speed of integrated circuits (ICs). They rarely consider hardware security requirements. As such, existing EDA tools often directly or indirectly introduce security vulnerabilities. These security vulnerabilities can later be exploited by attackers to leak information or compromise the hardware root-of-trust. In this paper, we show how traditional EDA tools optimize power, area and speed (PAS) metrics in cryptographic circuits at the cost of introducing vulnerabilities to side-channel analysis (SCA) attacks. To balance hardware security with traditional performance metrics, we propose an automatic tool, called CAD4EM-CLK, to secure ICs against power and electromagnetic (EM) SCA attacks. The tool optimizes clock networks for both traditional design requirements and security constraints. To achieve this goal, we first theoretically analyze and model the relationship between on-chip clock networks and side-channel security. The developed model will then guide the CAD4EM-CLK tool to adjust clock network structures to spread the leakage out temporally, also lower its amplitude proportion, so as to help reduce the leaked information. The proposed automatic tool is then validated on various cryptographic circuits. We use layout-level simulation to assess side-channel leakage and the experimental results prove the effectiveness of our proposed tool for power and EM side-channel protection.
引用
收藏
页码:371 / 382
页数:12
相关论文
共 48 条
[1]  
Alpert C. J., 2008, HDB ALGORITHMS PHYS
[2]  
Arsath KFM, 2020, PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P23, DOI [10.1109/host45689.2020.9300263, 10.1109/HOST45689.2020.9300263]
[3]  
Bayrak AG, 2013, DES AUT TEST EUROPE, P410
[4]  
Becker G., 2013, INT CRYPT MOD C ICMC, P1
[5]  
Cadence, SOC ENC
[6]  
Chen YY, 2010, DES AUT CON, P86
[7]   Modeling of power supply noise in large chips using the circuit-based finite-difference time-domain method [J].
Choi, J ;
Swaminathan, M ;
Do, N ;
Master, R .
IEEE TRANSACTIONS ON ELECTROMAGNETIC COMPATIBILITY, 2005, 47 (03) :424-439
[8]   SCNIFFER: Low-Cost, Automated, Efficient Electromagnetic Side-Channel Sniffing [J].
Danial, Josef ;
Das, Debayan ;
Ghosh, Santosh ;
Raychowdhury, Arijit ;
Sen, Shreyas .
IEEE ACCESS, 2020, 8 :173414-173427
[9]   EM and Power SCA-Resilient AES-256 Through >350x Current-Domain Signature Attenuation and Local Lower Metal Routing [J].
Das, Debayan ;
Danial, Josef ;
Golder, Anupam ;
Modak, Nirmoy ;
Maity, Shovan ;
Chatterjee, Baibhab ;
Seo, Dong-Hyun ;
Chang, Muya ;
Varna, Avinash L. ;
Krishnamurthy, Harish K. ;
Mathew, Sanu ;
Ghosh, Santosh ;
Raychowdhury, Arijit ;
Sen, Shreyas .
IEEE JOURNAL OF SOLID-STATE CIRCUITS, 2021, 56 (01) :136-150
[10]  
Das D, 2019, PROCEEDINGS OF THE 2019 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P11, DOI 10.1109/HST.2019.8740839