A State Machine Encoding Methodology Against Power Analysis Attacks

被引:1
作者
Agrawal, Richa [1 ]
Vemuri, Ranga [1 ]
Borowczak, Mike [2 ]
机构
[1] Univ Cincinnati, Sch Elect & Comp Syst, Digital Design Environm Lab, Cincinnati, OH 45221 USA
[2] Univ Wyoming, Coll Engn & Appl Sci, Dept Comp Sci, Laramie, WY 82071 USA
来源
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS | 2019年 / 35卷 / 05期
关键词
Low power; Finite state controllers; Power analysis; Satisfiability checking; Boolean constraints; SIDE; LOGIC;
D O I
10.1007/s10836-019-05821-z
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Power side-channel attacks have been shown to be effective against recovering protected information from integrated circuits. Existing defense methods are expensive in area, power or both. Small-scale ICs used in embedded systems and IoT devices are expected to be safe and secure, and yet cannot afford the area and power overheads of the sophisticated defense methods. This paper presents a design methodology for finite state controllers (FSMs) to defend against power analysis attacks while ensuring low power overhead. Further, a desired level of security can be achieved while minimizing power consumption. We formulate a set of constraints on state encoding based on security and power metrics. We express these constraints as a Boolean satisfiability (SAT) problem and use a SAT solver to generate constraint satisfying encodings. Experimental results using over 100 FSMs from BenGen and MCNC benchmark suites show a graded increase in encoding length (up to 40% for original FSMs and 40-70% for restructured FSMs) depending on the security level chosen. Trade-off between security and power is demonstrated as the mutual information between power side-channel and the Hamming attack models can vary between 0 and 2, depending on the level of security desired. An average power reduction of up to 40% is observed in power-constrained FSMs with respect to restructured FSMs and 4-20% reduction with respect to minimal encoding strategy.
引用
收藏
页码:621 / 639
页数:19
相关论文
共 42 条
[11]  
Brutscheck M, 2009, IDENTIFICATION DETER
[12]   REVERSE ENGINEERING AND DESIGN RECOVERY - A TAXONOMY [J].
CHIKOFSKY, EJ ;
CROSS, JH .
IEEE SOFTWARE, 1990, 7 (01) :13-17
[13]   ASNI: Attenuated Signature Noise Injection for Low-Overhead Power Side-Channel Attack Immunity [J].
Das, Debayan ;
Maity, Shovan ;
Bin Nasir, Saad ;
Ghosh, Santosh ;
Raychowdhury, Arijit ;
Sen, Shreyas .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2018, 65 (10) :3300-3311
[14]   Z3: An efficient SMT solver [J].
de Moura, Leonardo ;
Bjorner, Nikolaj .
TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 2008, 4963 :337-340
[15]  
Dijkstra E. W., 1959, Numer. Math, V1, P269, DOI [DOI 10.1007/BF01386390, 10.1007/BF01386390]
[16]  
Dofe J, 2016, IEEE INT SYMP CIRC S, P2050, DOI 10.1109/ISCAS.2016.7538981
[17]   When AES blinks:: introducing optical side channel [J].
Ferrigno, J. ;
Hlavac, M. .
IET INFORMATION SECURITY, 2008, 2 (03) :94-98
[18]  
Gandolfi K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P251
[19]  
Gebotys CH, 2002, LECT NOTES COMPUT SC, V2523, P114
[20]  
Gierlichs B, 2008, LECT NOTES COMPUT SC, V5154, P426