Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1629911.1629977acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

Analysis and mitigation of process variation impacts on Power-Attack Tolerance

Published: 26 July 2009 Publication History

Abstract

Embedded cryptosystems show increased vulnerabilities to implementation attacks such as power analysis. CMOS technology trends are causing increased process variations which impact the data-dependent power of deep submicron cryptosystem designs. In this paper, we use Monte Carlo methods in SPICE circuit simulations to analyze the statistical properties of the data-dependent power with predictive 45nm CMOS device and ITRS process variation models. In addition to the "measurement to disclosure" (MTD) used in [3], we define a lower level metric, Power-Attack Tolerance (PAT), to model both dynamic power and leakage power data-dependence. We show that the PAT of a typical cryptographic component implementation using CMOS standard-cells can significantly deteriorate due to process variations, thus increasing the component's vulnerability to power attacks. Power-attack-resistant logic styles (e.g. SABL [9]) have been developed which increase PAT by an order of magnitude by balancing power consumption at the gate level with considerable overhead. However in the presence of process variations, the degradation probability of MTD is 57%. To mitigate this problem, we demonstrate a transistor sizing optimization method that can reduce such negative impacts to only 18% with minimal power and area overhead.

References

[1]
P. Kocher, J. Jaffe, B. Jun, "Differential Power Analysis", CRYPTO, LNCS 1666, pp. 388--397, 1999.
[2]
S. Mangard, "Hardware Countermeasures Against DPA -- A Statistical Analysis of Their Effectiveness", CT-RSA, LNCS 2964, pp. 222--235, 2004.
[3]
K. Tiri, I. Verbauwhede, "A digital design flow for secure integrated circuits," IEEE Transaction on CAD, vol. 25(7), pp. 1197--1208, 2006.
[4]
K. Tiri, I. Verbauwhede, "Simulation models for side-channel information leaks," ACM/IEEE DAC, pp. 228--233, 2005.
[5]
L. Lin, W. Burleson, "Leakage-based differential power analysis (LDPA) on sub-90nm CMOS cryptosystems", IEEE ISCAS, pp. 252--255, 2008.
[6]
J. Tschanz, J. Kao, S. Narendra, R. Nair, D. Antoniadis, A. Chandrakasan, V. De, "Adaptive body bias for reducing impacts of die-to-die and within-die parameter variations on microprocessor frequency and leakage," IEEE Journal of Solid-State Circuits, Vol. 37(11), pp. 1396--1402, 2002.
[7]
K. Tiri, "Side-channel attack pitfalls," ACM/IEEE DAC, pp. 15--20, 2007.
[8]
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, B. Sunar, "Trojan detection using IC fingerprinting," IEEE Symposium on Security and Privacy, pp. 296--310, 2007.
[9]
K. Tiri, I. Verbauwhede, "Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology," CHES, LNCS, vol. 2779, pp. 125--136, 2003.
[10]
P. Yu, P. Schaumont, "Secure FPGA circuits using controlled placement and routing," ACM/IEEE CODES+ISSS, pp. 45--50, 2007.
[11]
S. Mukhopadhyay, K. Roy, "Modeling and estimation of total leakage current in nano-scaled CMOS devices considering the effect of parameter variation," ACM/IEEE ISLPED, pp. 172--175, 2003.
[12]
R. Rao, A. Srivastava, D. Blaauw, D. Sylvester, "Statistical estimation of leakage current considering inter- and intra-die process variation," ACM/IEEE ISLPED, pp. 84--89, 2003.
[13]
International Technology Roadmap for Semiconductors, 2006, http://public.itrs.net.
[14]
W. Zhao, Y. Cao, "New generation of predictive technology model for sub-45nm design exploration," IEEE ISQED, pp. 585--590, 2006.
[15]
W. Mendenhall, and T. Sincich, "Statistics for engineering and the sciences," 5th edition, by Prentice Hall, 2007.
[16]
S. Bhunia, S. Mukhopadhyay, K. Roy, "Process variations and process-tolerant design," IEEE VLSI Design, pp. 699--704, 2007.
[17]
K. Takeuchi, T. Tatsumi, A. Furukawa, "Channel engineering for the reduction of random-dopant-placement-induced threshold voltage fluctuation," IEEE IEDM, pp. 841--844, 1997.
[18]
R. Brodersen, M. Horowitz, D. Markovic, B. Nikolic, V. Stojanovic, "Methods for true power minimization", ACM/IEEE ICCAD, pp. 35--42, 2002.
[19]
P. Gupta, A. Kahng, P. Sharma, D. Sylvester, "Selective gate-level biasing for cost-effective runtime leakage control," ACM/IEEE DAC, pp. 327--330, 2004.

Cited By

View all
  • (2022)Design and Analysis of Secure Quasi-Adiabatic Tristate Physical Unclonable FunctionIEEE Consumer Electronics Magazine10.1109/MCE.2021.311754111:4(98-104)Online publication date: 1-Jul-2022
  • (2021)A dual mode self-test for a stand alone AES corePLOS ONE10.1371/journal.pone.026143116:12(e0261431)Online publication date: 23-Dec-2021
  • (2020)Early Analysis of Security Threats by Modeling and Simulating Power Attacks in SystemC2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring)10.1109/VTC2020-Spring48590.2020.9129426(1-5)Online publication date: May-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DAC '09: Proceedings of the 46th Annual Design Automation Conference
July 2009
994 pages
ISBN:9781605584973
DOI:10.1145/1629911
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 July 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Monte Carlo simulation
  2. differential power analysis
  3. process variation
  4. transistor sizing

Qualifiers

  • Research-article

Funding Sources

Conference

DAC '09
Sponsor:
DAC '09: The 46th Annual Design Automation Conference 2009
July 26 - 31, 2009
California, San Francisco

Acceptance Rates

Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

Upcoming Conference

DAC '25
62nd ACM/IEEE Design Automation Conference
June 22 - 26, 2025
San Francisco , CA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Design and Analysis of Secure Quasi-Adiabatic Tristate Physical Unclonable FunctionIEEE Consumer Electronics Magazine10.1109/MCE.2021.311754111:4(98-104)Online publication date: 1-Jul-2022
  • (2021)A dual mode self-test for a stand alone AES corePLOS ONE10.1371/journal.pone.026143116:12(e0261431)Online publication date: 23-Dec-2021
  • (2020)Early Analysis of Security Threats by Modeling and Simulating Power Attacks in SystemC2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring)10.1109/VTC2020-Spring48590.2020.9129426(1-5)Online publication date: May-2020
  • (2018)Performance Analysis in Digital Circuits for Process Corner Variations, Slew-Rate and Load CapacitanceWireless Personal Communications: An International Journal10.5555/3288994.3289038103:1(99-115)Online publication date: 1-Nov-2018
  • (2018)A Novel Sizing Method Aiming Security Against Differential Power Analysis2018 25th IEEE International Conference on Electronics, Circuits and Systems (ICECS)10.1109/ICECS.2018.8617849(429-432)Online publication date: Dec-2018
  • (2018)Performance Analysis in Digital Circuits for Process Corner Variations, Slew-Rate and Load CapacitanceWireless Personal Communications10.1007/s11277-018-5428-8103:1(99-115)Online publication date: 23-Feb-2018
  • (2016)Invited - Who is the major threat to tomorrow's security?Proceedings of the 53rd Annual Design Automation Conference10.1145/2897937.2905022(1-5)Online publication date: 5-Jun-2016
  • (2016)A Comparative Security Analysis of Current and Emerging TechnologiesIEEE Micro10.1109/MM.2016.8736:5(50-61)Online publication date: 1-Sep-2016
  • (2015)Mutual Information Analysis for Three-Phase Dynamic Current Mode Logic against Side-Channel AttackETRI Journal10.4218/etrij.15.0114.029737:3(584-594)Online publication date: 1-Jun-2015
  • (2015)Statistically Validating the Impact of Process Variations on Analog and Mixed Signal DesignsProceedings of the 25th edition on Great Lakes Symposium on VLSI10.1145/2742060.2742122(99-102)Online publication date: 20-May-2015
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media