A flexible leakage trace collection setup for arbitrary cryptographic IP cores

2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)(2018)

引用 7|浏览7
暂无评分
摘要
Leakage Assessment and Side Channel Attacks (SCA) leakage trace acquisition tools and platforms require a considerable amount of time to collect millions of traces and rely on custom, hard to change or handle acquisition control mechanisms. To match these problems, in this paper, a flexible and scalable architecture for leakage trace collection is proposed, providing a fast, reconfigurable and flexible control mechanism that can be easily scaled to a wide variety of Devices Under Test (DUT). The proposed system migrates test vector generation, control and transmission, from off-board Personal Computer (PC) to an on-board embedded-system hardware control mechanism. The proposed solution provides a toolset that can be used to structure various leakage assessment scenarios, regardless of the DUT's implemented cryptographic algorithm. The proposed approach enables single, multiple encryption per control loop round and DUT clock frequency adjustment to achieve accurate and fast leakage trace collection even for low-mid range oscilloscopes.
更多
查看译文
关键词
flexible leakage trace collection setup,arbitrary cryptographic IP cores,acquisition control mechanisms,flexible architecture,scalable architecture,fast control mechanism,reconfigurable control mechanism,flexible control mechanism,test vector generation,on-board embedded-system hardware control mechanism,leakage assessment scenarios,accurate leakage trace collection,fast leakage trace collection,off-board personal computer,DUT implemented cryptographic algorithm
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要