A State Machine Encoding Methodology Against Power Analysis Attacks

被引:0
作者
Richa Agrawal
Ranga Vemuri
Mike Borowczak
机构
[1] University of Cincinnati,Digital Design Environments Laboratory, School of Electronics and Computing Systems
[2] University of Wyoming,Department of Computer Science, College of Engineering and Applied Science
来源
Journal of Electronic Testing | 2019年 / 35卷
关键词
Low power; Finite state controllers; Power analysis; Satisfiability checking; Boolean constraints;
D O I
暂无
中图分类号
学科分类号
摘要
Power side-channel attacks have been shown to be effective against recovering protected information from integrated circuits. Existing defense methods are expensive in area, power or both. Small-scale ICs used in embedded systems and IoT devices are expected to be safe and secure, and yet cannot afford the area and power overheads of the sophisticated defense methods. This paper presents a design methodology for finite state controllers (FSMs) to defend against power analysis attacks while ensuring low power overhead. Further, a desired level of security can be achieved while minimizing power consumption. We formulate a set of constraints on state encoding based on security and power metrics. We express these constraints as a Boolean satisfiability (SAT) problem and use a SAT solver to generate constraint satisfying encodings. Experimental results using over 100 FSMs from BenGen and MCNC benchmark suites show a graded increase in encoding length (up to 40% for original FSMs and 40–70% for restructured FSMs) depending on the security level chosen. Trade-off between security and power is demonstrated as the mutual information between power side-channel and the Hamming attack models can vary between 0 and 2, depending on the level of security desired. An average power reduction of up to 40% is observed in power-constrained FSMs with respect to restructured FSMs and 4–20% reduction with respect to minimal encoding strategy.
引用
收藏
页码:621 / 639
页数:18
相关论文
共 27 条
[1]  
Chikofsky EJ(1990)Reverse engineering and design recovery: a taxonomy IEEE Softw 7 13-17
[2]  
Cross JH(2018)ASNI: attenuated signature noise injection for low-overhead power side-channel attack immunity IEEE Trans Circuits Syst Regul Pap 65 3300-3311
[3]  
Das D(1959)A note on two problems in connexion with graphs Numerische mathematik 1 269-271
[4]  
Maity S(2008)When AES blinks: introducing optical side channel IET Inf Secur 2 94-98
[5]  
Nasir SB(2014)Sequential algorithm for low-power encoding internal states of finite state machines Journal of Computer & Systems Sciences International 53 92-28
[6]  
Ghosh S(2008)Reverse engineering of CMOS integrated circuits Elektronika ir elektrotechnika 88 25-60
[7]  
Raychowdhury A(2007)Power and electromagnetic analysis: Improved model, consequences and comparisons Integration, the VLSI journal 40 52-410
[8]  
Sen S(2009)Algebraic side-channel attacks Inscrypt 6151 393-416
[9]  
Dijkstra EW(1995)Power estimation methods for sequential logic circuits IEEE Trans Very Large Scale Integr VLSI Syst 3 404-undefined
[10]  
Ferrigno J(2005)Side-channel attacks: ten years after its publication and the impacts on cryptographic module security testing IACR Cryptology ePrint Archive 2005 388-undefined