EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor. Homma, N., Hayashi, Y., Miura, N., Fujimoto, D., Tanaka, D., Nagata, M., & Aoki, T. In Cryptographic Hardware and Embedded Systems – CHES 2014, of Lecture Notes in Computer Science, pages 1–16, September, 2014. Springer, Berlin, Heidelberg.
Paper doi abstract bibtex This paper presents a standard-cell-based semi-automatic design methodology of a new conceptual countermeasure against electromagnetic (EM) analysis and fault-injection attacks. The countermeasure namely EM attack sensor utilizes LC oscillators which detect variations in the EM field around a cryptographic LSI caused by a micro probe brought near the LSI. A dual-coil sensor architecture with an LUT-programming-based digital calibration can prevent a variety of microprobe-based EM attacks that cannot be thwarted by conventional countermeasures. All components of the sensor core are semiautomatically designed by standard EDA tools with a fully-digital standard cell library and hence minimum design cost. This sensor can be therefore scaled together with the cryptographic LSI to be protected. The sensor prototype is designed based on the proposed methodology together with a 128bit-key composite AES processor in 0.18μm CMOS with overheads of only 2respectively. The validity against a variety of EM attack scenarios has been verified successfully.
@inproceedings{homma_em_2014,
series = {Lecture {Notes} in {Computer} {Science}},
title = {{EM} {Attack} {Is} {Non}-invasive? - {Design} {Methodology} and {Validity} {Verification} of {EM} {Attack} {Sensor}},
isbn = {978-3-662-44708-6 978-3-662-44709-3},
shorttitle = {{EM} {Attack} {Is} {Non}-invasive?},
url = {https://link.springer.com/chapter/10.1007/978-3-662-44709-3_1},
doi = {10.1007/978-3-662-44709-3_1},
abstract = {This paper presents a standard-cell-based semi-automatic design methodology of a new conceptual countermeasure against electromagnetic (EM) analysis and fault-injection attacks. The countermeasure namely EM attack sensor utilizes LC oscillators which detect variations in the EM field around a cryptographic LSI caused by a micro probe brought near the LSI. A dual-coil sensor architecture with an LUT-programming-based digital calibration can prevent a variety of microprobe-based EM attacks that cannot be thwarted by conventional countermeasures. All components of the sensor core are semiautomatically designed by standard EDA tools with a fully-digital standard cell library and hence minimum design cost. This sensor can be therefore scaled together with the cryptographic LSI to be protected. The sensor prototype is designed based on the proposed methodology together with a 128bit-key composite AES processor in 0.18μm CMOS with overheads of only 2respectively. The validity against a variety of EM attack scenarios has been verified successfully.},
language = {en},
urldate = {2017-07-04TZ},
booktitle = {Cryptographic {Hardware} and {Embedded} {Systems} – {CHES} 2014},
publisher = {Springer, Berlin, Heidelberg},
author = {Homma, Naofumi and Hayashi, Yu-ichi and Miura, Noriyuki and Fujimoto, Daisuke and Tanaka, Daichi and Nagata, Makoto and Aoki, Takafumi},
month = sep,
year = {2014},
pages = {1--16}
}
Downloads: 0
{"_id":"Kh7engpkTFRee6JqK","bibbaseid":"homma-hayashi-miura-fujimoto-tanaka-nagata-aoki-emattackisnoninvasivedesignmethodologyandvalidityverificationofemattacksensor-2014","authorIDs":[],"author_short":["Homma, N.","Hayashi, Y.","Miura, N.","Fujimoto, D.","Tanaka, D.","Nagata, M.","Aoki, T."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","series":"Lecture Notes in Computer Science","title":"EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor","isbn":"978-3-662-44708-6 978-3-662-44709-3","shorttitle":"EM Attack Is Non-invasive?","url":"https://link.springer.com/chapter/10.1007/978-3-662-44709-3_1","doi":"10.1007/978-3-662-44709-3_1","abstract":"This paper presents a standard-cell-based semi-automatic design methodology of a new conceptual countermeasure against electromagnetic (EM) analysis and fault-injection attacks. The countermeasure namely EM attack sensor utilizes LC oscillators which detect variations in the EM field around a cryptographic LSI caused by a micro probe brought near the LSI. A dual-coil sensor architecture with an LUT-programming-based digital calibration can prevent a variety of microprobe-based EM attacks that cannot be thwarted by conventional countermeasures. All components of the sensor core are semiautomatically designed by standard EDA tools with a fully-digital standard cell library and hence minimum design cost. This sensor can be therefore scaled together with the cryptographic LSI to be protected. The sensor prototype is designed based on the proposed methodology together with a 128bit-key composite AES processor in 0.18μm CMOS with overheads of only 2respectively. The validity against a variety of EM attack scenarios has been verified successfully.","language":"en","urldate":"2017-07-04TZ","booktitle":"Cryptographic Hardware and Embedded Systems – CHES 2014","publisher":"Springer, Berlin, Heidelberg","author":[{"propositions":[],"lastnames":["Homma"],"firstnames":["Naofumi"],"suffixes":[]},{"propositions":[],"lastnames":["Hayashi"],"firstnames":["Yu-ichi"],"suffixes":[]},{"propositions":[],"lastnames":["Miura"],"firstnames":["Noriyuki"],"suffixes":[]},{"propositions":[],"lastnames":["Fujimoto"],"firstnames":["Daisuke"],"suffixes":[]},{"propositions":[],"lastnames":["Tanaka"],"firstnames":["Daichi"],"suffixes":[]},{"propositions":[],"lastnames":["Nagata"],"firstnames":["Makoto"],"suffixes":[]},{"propositions":[],"lastnames":["Aoki"],"firstnames":["Takafumi"],"suffixes":[]}],"month":"September","year":"2014","pages":"1–16","bibtex":"@inproceedings{homma_em_2014,\n\tseries = {Lecture {Notes} in {Computer} {Science}},\n\ttitle = {{EM} {Attack} {Is} {Non}-invasive? - {Design} {Methodology} and {Validity} {Verification} of {EM} {Attack} {Sensor}},\n\tisbn = {978-3-662-44708-6 978-3-662-44709-3},\n\tshorttitle = {{EM} {Attack} {Is} {Non}-invasive?},\n\turl = {https://link.springer.com/chapter/10.1007/978-3-662-44709-3_1},\n\tdoi = {10.1007/978-3-662-44709-3_1},\n\tabstract = {This paper presents a standard-cell-based semi-automatic design methodology of a new conceptual countermeasure against electromagnetic (EM) analysis and fault-injection attacks. The countermeasure namely EM attack sensor utilizes LC oscillators which detect variations in the EM field around a cryptographic LSI caused by a micro probe brought near the LSI. A dual-coil sensor architecture with an LUT-programming-based digital calibration can prevent a variety of microprobe-based EM attacks that cannot be thwarted by conventional countermeasures. All components of the sensor core are semiautomatically designed by standard EDA tools with a fully-digital standard cell library and hence minimum design cost. This sensor can be therefore scaled together with the cryptographic LSI to be protected. The sensor prototype is designed based on the proposed methodology together with a 128bit-key composite AES processor in 0.18μm CMOS with overheads of only 2respectively. The validity against a variety of EM attack scenarios has been verified successfully.},\n\tlanguage = {en},\n\turldate = {2017-07-04TZ},\n\tbooktitle = {Cryptographic {Hardware} and {Embedded} {Systems} – {CHES} 2014},\n\tpublisher = {Springer, Berlin, Heidelberg},\n\tauthor = {Homma, Naofumi and Hayashi, Yu-ichi and Miura, Noriyuki and Fujimoto, Daisuke and Tanaka, Daichi and Nagata, Makoto and Aoki, Takafumi},\n\tmonth = sep,\n\tyear = {2014},\n\tpages = {1--16}\n}\n\n","author_short":["Homma, N.","Hayashi, Y.","Miura, N.","Fujimoto, D.","Tanaka, D.","Nagata, M.","Aoki, T."],"key":"homma_em_2014","id":"homma_em_2014","bibbaseid":"homma-hayashi-miura-fujimoto-tanaka-nagata-aoki-emattackisnoninvasivedesignmethodologyandvalidityverificationofemattacksensor-2014","role":"author","urls":{"Paper":"https://link.springer.com/chapter/10.1007/978-3-662-44709-3_1"},"downloads":0},"bibtype":"inproceedings","biburl":"https://bibbase.org/zotero/ky25","creationDate":"2019-05-11T17:47:04.544Z","downloads":0,"keywords":[],"search_terms":["attack","non","invasive","design","methodology","validity","verification","attack","sensor","homma","hayashi","miura","fujimoto","tanaka","nagata","aoki"],"title":"EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor","year":2014,"dataSources":["XxiQtwZYfozhQmvGR"]}