- Cryptographic Implementations and Security
- Physical Unclonable Functions (PUFs) and Hardware Security
- Chaos-based Image/Signal Encryption
- Electromagnetic Compatibility and Measurements
- Security and Verification in Computing
- Bluetooth and Wireless Communication Technologies
- Electrostatic Discharge in Electronics
- Radiation Effects in Electronics
- Quantum-Dot Cellular Automata
- Antenna Design and Analysis
- Photonic and Optical Devices
- Advanced MIMO Systems Optimization
- Plasma Diagnostics and Applications
- Energy Harvesting in Wireless Networks
- Photonic Crystals and Applications
- Medical Imaging and Pathology Studies
- Millimeter-Wave Propagation and Modeling
- Advanced Malware Detection Techniques
- Advancements in PLL and VCO Technologies
- Wireless Signal Modulation Classification
- Semiconductor Lasers and Optical Devices
- Coding theory and cryptography
- Cultural Heritage Materials Analysis
- Low-power high-performance VLSI design
- Integrated Circuits and Semiconductor Failure Analysis
The University of Texas at Austin
2011-2024
University of Colorado System
2024
University of Colorado Boulder
2024
National Institute of Standards and Technology
2024
Communications Technology Laboratory
2024
Birla Institute of Technology and Science - Hyderabad Campus
2016
A localized electromagnetic (EM) attack is a potent threat to security of embedded cryptographic implementations. The utilizes high resolution EM probes localize and exploit information leakage in sub-circuits system, providing not available traditional power attacks. In this paper, we propose countermeasure based on randomizing the assignment sensitive data parallel datapath components high-performance implementation AES. contrast conventional design where each state register byte routed...
Cryptographic hardware modules, by exhibiting unique power and EM signatures, are vulnerable to Side Channel Attacks (SCAs) revealing secret keys. Prior countermeasures based on port [1] –[4] masking [5] incur significant area overheads or often not amenable scaling ASIC flow integration. work clock randomization [6] can cause SoC timing verification integration challenges. asynchronous AES implementations [7] rely dual-rail completion detection round-key-unwrap, which expensive in...
A galvanic isolation (GI) technique for cryptographic cores is proposed to mitigate power and electromagnetic (EM) sidechannel analysis (SCA) attacks. The design uses deep N-well technology an integrated charge pump-based delivery management completely isolate V <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">CC</sub> , xmlns:xlink="http://www.w3.org/1999/xlink">SS</sub> substrate nodes from the external supply ground pins, improving SCA...
We present physical design strategies viz. (i) power grid shielding, (ii) twisting, (iii) increased local decoupling capacitors with VSS shields, and (iv) isolated S-Box module placement to improve the resilience of Advanced Encryption Standard (AES-128) cryptographic core against fine-grained electromagnetic (EM) side-channel analysis (SCA). Localized EM field measurements are performed using a 0.5 mm radius H-field probe on 3 different, 40nm CMOS test-chips implementing 9 configurations...
The analysis of variance (ANOVA) F-statistic is proposed as an indicator to accelerate the identification nearfield vulnerabilities cryptographic modules electromagnetic side-channel (EM SCA) attacks. It hypothesized that optimal measurement configurations require collecting fewest measurements disclosure have high F-values; i.e., in these configurations, measured signals exhibit variability when encryption changes and low repeated. concept demonstrated for EM SCA attack disclose secret key...
The effectiveness of coarse- and fine-grained electromagnetic (EM) side-channel analysis (SCA) attacks, as well power SCA are empirically evaluated on implementations the Advanced Encryption Standard (AES) algorithm. Coarse-grained EM attacks use a single sensor configuration to measure aggregated emanation or consumption for large set encryptions, then analyze this signals recover all encryption key bytes. In contrast, first perform high-resolution scans with relatively small probes in...
A measurement method based on the analysis of variance <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">F</i> -statistic is presented to rapidly evaluate cryptographic modules’ vulnerability fine-grained EM side-channel (SCA) attacks. The proposed assumes that evaluators can control device under test set carefully chosen inputs computations interest and repeat measurements as many times needed. It identifies optimal configurations—that...
Electromagnetic (EM) fields have been extensively studied as potent side-channel tools for testing the security of hardware implementations. In this work, a low-cost disassembler that uses fine-grained EM signals to predict program's execution trace with high accuracy is proposed. Unlike conventional disassemblers, proposed does not require extensive randomized instantiations instructions profile them, instead relying on leakage-model-informed sub-sampling potential architectural states...
An adaptive acquisition protocol is presented to rapidly identify optimal near-field measurement configurations for performing electromagnetic side-channel analysis attacks on physical implementations of cryptographic modules. Because measured fields vary with probe parameters as well the data being encrypted, identifying requires searching among a large number possible configurations. The proposed multi-step that corresponds greedy search in 4-D configuration space consisting coordinates,...
The analysis of variance (ANOVA) F-statistic is proposed as a tool to isolate near-field measurement configurations that are sensitive targeted chip processes in embedded systems. It hypothesized the desired have high F-values, i.e., variation target process major contributor whereas obfuscating background and uncertainty minor contributors measured signals. concept demonstrated by isolating data-dependent for commercially available variant 8051 micro-controller: First, multi-stage protocol...
A two-phase measurement method is presented to evaluate Bluetooth low energy (BLE) modules' vulnerability electromagnetic side-channel analysis attacks. In both phases, signals are collected by probing the fields near surface of a chip that operates as generic attribute profile (GATT) server, while it receives and processes data via Bluetooth. Phase I, first optimal configurations—time intervals, probe positions, orientations—are identified computing analysis-of-variance (ANOVA) F-statistic...
An efficient modeling approach to synthesize near-field EM signals radiated from a general-purpose micro-controller is proposed. The method assumes that for on-chip data computations can be generated using linear combination of basis functions, constructed data-dependent profiles correspond vectors in binary vector space.
The ability of various countermeasures to secure cryptographic modules implementing the Advanced Encryption Standard (AES) algorithm is experimentally evaluated using fine-grained time- and frequency-domain electromagnetic side-channel analysis (EM SCA) attacks. Because an infeasibly large number measurements on-chip EM emanations should be required break protection a cryptosystem, novel approach used keep acquisition costs low while testing system resilience SCA An adaptive scan protocol...
A statistical method that rapidly identifies near-field probe configurations are ineffective for leaking information from advanced encryption standard (AES) implementations is proposed. The can be used as a pre-characterization stage to accelerate recently introduced multistage analysis of variance (ANOVA)-based measurement protocol evaluating crypto-systems' vulnerability fine-grained EM side-channel attacks.
A simulation model of C-band Variable Optical Attenuator using X-shaped photonic crystal ring resonator is proposed. Tuning achieved through refractive index variation. An attenuation 30dB for 0.0022 change in index.