Chrome Extension
WeChat Mini Program
Use on ChatGLM

Island-based Random Dynamic Voltage Scaling vs ML-Enhanced Power Side-Channel Attacks

Dake Chen, Christine Goins, Maxwell Waugaman,Georgios D. Dimou,Peter A. Beerel

GLSVLSI '23: Proceedings of the Great Lakes Symposium on VLSI 2023(2023)

Cited 0|Views3
No score
Abstract
In this paper, we describe and analyze an island-based random dynamic voltage scaling (iRDVS) approach to thwart power side-channel attacks. We first analyze the impact of the number of independent voltage islands on the resulting signal-to-noise ratio and trace misalignment. As part of our analysis of misalignment, we propose a novel unsupervised machine learning (ML) based attack that is effective on systems with three or fewer independent voltages. Our results show that iRDVS with four voltage islands, however, cannot be broken with 200k encryption traces, suggesting that iRDVS can be effective. We finish the talk by describing an iRDVS test chip in a 12nm FinFet process that incorporates three variants of an AES-256 accelerator, all originating from the same RTL. This included a synchronous core, an asynchronous core with no protection, and a core employing the iRDVS technique using asynchronous logic. Lab measurements from the chips indicated that both unprotected variants failed the test vector leakage assessment (TVLA) security metric test, while the iRDVS was proven secure in a variety of configurations.
More
Translated text
Key words
Hardware security, Side-channel attack, Machine learning
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined