CAD for Assurance of Electronic Systems

Side Channel Analysis (SCA) Attacks


Side-Channel Attacks (SCAs) exploit emissions from integrated circuits (ICs), which can be in the form of electromagnetic radiations, sound, light, power consumption, and/or timing information. Since, its inception many SCAs have been developed such as audio-based attacks, cache and timing attacks, power monitoring attacks, electromagnetic emission monitoring attacks, data remanence, software-initiated fault-attacks, optical attacks, and differential-fault analysis. These attacks exploit vulnerabilities in the ICs of the Internet of Things (IoT) devices, mobile devices, smart cards, and computers to infer sensitive information. The new era of billions of personal devices and new technologies such as cloud computing are enabling newer SCAs such as cache-timing attacks or DRAM row-buffer attacks, which can be carried out remotely by executing malicious code in the targeted cloud environment. Existing architectural and circuit level solutions for preventing SCAs in ICs result in significant area and power overhead. Furthermore, the design optimization process of existing computer-aided design (CAD) tools results in side-channel leakage. As such, new CAD tools are needed that incorporates security measures to prevent side-channel leakage in ICs. Consequently, tools such as CAD4EM-Placement, CAD4EM-RTL, AutoEM, CAD4Power-FPGA, XFC, FEDS, and SAFARI have been developed to address SCA concerns.

Related Tools


K, Keerthi; Roy, Indrani; Rebeiro, Chester; Hazra, Aritra; Bhunia, Swarup

FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers Journal Article

In: IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2020, no. 2, pp. 272-299, 2020.

Abstract | Links | BibTeX

He, Jiaji; Ma, Haocheng; Guo, Xiaolong; Zhao, Yiqiang; Jin, Yier

Design for EM Side-Channel Security through Quantitative Assessment of RTL Implementations Proceedings Article

In: 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 62-67, IEEE, Beijing, China , 2020.

Abstract | Links | BibTeX

Ma, Haocheng; He, Jiaji; Liu, Yanjiang; Zhao, Yiqiang; Jin, Yier

CAD4EM-P: Security-Driven Placement Tools for Electromagnetic Side Channel Protection Proceedings Article

In: 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp. 1-6, IEEE, Xi'an, P.R. China, 2019.

Abstract | Links | BibTeX

Roy, Indrani; Rebeiro, Chester; Hazra, Aritra; Bhunia, Swarup

SAFARI: Automatic Synthesis of Fault-Attack Resistant Block Cipher Implementations Journal Article

In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, no. 4, pp. 752-765, 2019, ISBN: 19545508.

Abstract | Links | BibTeX

Santikellur, Pranesh; Bhattacharyay, Aritra; Chakraborty, Rajat Subhra

Deep Learning based Model Building Attacks on Arbiter PUF Compositions Miscellaneous

Cryptology ePrint Archive, Report 2019/566, 2019.

Abstract | Links | BibTeX

Takarabt, Sofiane; Schaub, Alexander; Facon, Adrien; Guilley, Sylvain; Sauvage, Laurent; Souissi, Youssef; Mathieu, Yves

Cache-Timing Attacks Still Threaten IoT Devices Proceedings Article

In: Codes, Cryptology and Information Security, pp. 13–30, Springer International Publishing, Cham, 2019, ISBN: 978-3-030-16458-4.

Abstract | Links | BibTeX

Carré, Sébastien; Facon, Adrien; Guilley, Sylvain; Takarabt, Sofiane; Schaub, Alexander; Souissi, Youssef

Cache-Timing Attack Detection and Prevention Proceedings Article

In: Constructive Side-Channel Analysis and Secure Design, pp. 13–21, Springer International Publishing, Cham, 2019, ISBN: 978-3-030-16350-1.

Abstract | Links | BibTeX

Bruneau, Nicolas; Christen, Charles; Danger, Jean-Luc; Facon, Adrien; Guilley, Sylvain

Security Evaluation Against Side-Channel Analysis at Compilation Time Proceedings Article

In: pp. 129–148, Springer International Publishing, Cham, 2019, ISBN: 978-3-030-36237-9.

Abstract | Links | BibTeX

Facon, Adrien; Guilley, Sylvain; Lec'hvien, Matthieu; Marion, Damien; Perianin, Thomas

Binary Data Analysis for Source Code Leakage Assessment Proceedings Article

In: Innovative Security Solutions for Information Technology and Communications, pp. 391–409, Springer International Publishing, Cham, 2019, ISBN: 978-3-030-12942-2.

Abstract | Links | BibTeX

Souissi, Youssef; Facon, Adrien; Guilley, Sylvain

Virtual Security Evaluation Proceedings Article

In: Carlet, Claude; Guilley, Sylvain; Nitaj, Abderrahmane; Souidi, El Mamoun (Ed.): Codes, Cryptology and Information Security, pp. 3–12, Springer International Publishing, Cham, 2019, ISBN: 978-3-030-16458-4.

Abstract | Links | BibTeX

Mathieu, Brandon L.; McCue, Jamin J.; Duncan, Lucas; Dupaix, Brian; Lavasani, Hossein Miri; Khalil, Waleed

A Capacitively Coupled, Pseudo Return-to-Zero Input, Latched-Bias Data Receiver Journal Article

In: IEEE Journal of Solid-State Circuits, vol. 53, no. 9, pp. 2500-2511, 2018, ISSN: 1558-173X.

Abstract | Links | BibTeX

Takarabt, Sofiane; Chibani, Kais; Facon, Adrien; Guilley, Sylvain; Mathieu, Yves; Sauvage, Laurent; Souissi, Youssef

Pre-silicon Embedded System Evaluation as New EDA Tool for Security Verification Proceedings Article

In: 2018 IEEE 3rd International Verification and Security Workshop (IVSW), pp. 74-79, 2018.

Abstract | Links | BibTeX

Khanna, Punit; Rebeiro, Chester; Hazra, Aritra

XFC: A Framework for eXploitable Fault Characterization in Block Ciphers Proceedings Article

In: ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1-6, DAC ACM/IEEE/EDAC, 2017, ISBN: 978-1-4503-4927-7.

Abstract | Links | BibTeX