V Iyer

ORCID: 0000-0002-9833-2710
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Chaos-based Image/Signal Encryption
  • Electromagnetic Compatibility and Measurements
  • Security and Verification in Computing
  • Bluetooth and Wireless Communication Technologies
  • Electrostatic Discharge in Electronics
  • Radiation Effects in Electronics
  • Quantum-Dot Cellular Automata
  • Antenna Design and Analysis
  • Photonic and Optical Devices
  • Advanced MIMO Systems Optimization
  • Plasma Diagnostics and Applications
  • Energy Harvesting in Wireless Networks
  • Photonic Crystals and Applications
  • Medical Imaging and Pathology Studies
  • Millimeter-Wave Propagation and Modeling
  • Advanced Malware Detection Techniques
  • Advancements in PLL and VCO Technologies
  • Wireless Signal Modulation Classification
  • Semiconductor Lasers and Optical Devices
  • Coding theory and cryptography
  • Cultural Heritage Materials Analysis
  • Low-power high-performance VLSI design
  • Integrated Circuits and Semiconductor Failure Analysis

The University of Texas at Austin
2011-2024

University of Colorado System
2024

University of Colorado Boulder
2024

National Institute of Standards and Technology
2024

Communications Technology Laboratory
2024

Birla Institute of Technology and Science - Hyderabad Campus
2016

A localized electromagnetic (EM) attack is a potent threat to security of embedded cryptographic implementations. The utilizes high resolution EM probes localize and exploit information leakage in sub-circuits system, providing not available traditional power attacks. In this paper, we propose countermeasure based on randomizing the assignment sensitive data parallel datapath components high-performance implementation AES. contrast conventional design where each state register byte routed...

10.1109/hst.2019.8741026 article EN 2019-05-01

Cryptographic hardware modules, by exhibiting unique power and EM signatures, are vulnerable to Side Channel Attacks (SCAs) revealing secret keys. Prior countermeasures based on port [1] –[4] masking [5] incur significant area overheads or often not amenable scaling ASIC flow integration. work clock randomization [6] can cause SoC timing verification integration challenges. asynchronous AES implementations [7] rely dual-rail completion detection round-key-unwrap, which expensive in...

10.1109/isscc49657.2024.10454574 article EN 2022 IEEE International Solid- State Circuits Conference (ISSCC) 2024-02-18

A galvanic isolation (GI) technique for cryptographic cores is proposed to mitigate power and electromagnetic (EM) sidechannel analysis (SCA) attacks. The design uses deep N-well technology an integrated charge pump-based delivery management completely isolate V <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">CC</sub> , xmlns:xlink="http://www.w3.org/1999/xlink">SS</sub> substrate nodes from the external supply ground pins, improving SCA...

10.1109/cicc51472.2021.9431524 article EN 2022 IEEE Custom Integrated Circuits Conference (CICC) 2021-04-01

We present physical design strategies viz. (i) power grid shielding, (ii) twisting, (iii) increased local decoupling capacitors with VSS shields, and (iv) isolated S-Box module placement to improve the resilience of Advanced Encryption Standard (AES-128) cryptographic core against fine-grained electromagnetic (EM) side-channel analysis (SCA). Localized EM field measurements are performed using a 0.5 mm radius H-field probe on 3 different, 40nm CMOS test-chips implementing 9 configurations...

10.1109/cicc51472.2021.9431438 article EN 2022 IEEE Custom Integrated Circuits Conference (CICC) 2021-04-01

The analysis of variance (ANOVA) F-statistic is proposed as an indicator to accelerate the identification nearfield vulnerabilities cryptographic modules electromagnetic side-channel (EM SCA) attacks. It hypothesized that optimal measurement configurations require collecting fewest measurements disclosure have high F-values; i.e., in these configurations, measured signals exhibit variability when encryption changes and low repeated. concept demonstrated for EM SCA attack disclose secret key...

10.1109/ims19712.2021.9575028 article EN 2022 IEEE/MTT-S International Microwave Symposium - IMS 2022 2021-06-07

The effectiveness of coarse- and fine-grained electromagnetic (EM) side-channel analysis (SCA) attacks, as well power SCA are empirically evaluated on implementations the Advanced Encryption Standard (AES) algorithm. Coarse-grained EM attacks use a single sensor configuration to measure aggregated emanation or consumption for large set encryptions, then analyze this signals recover all encryption key bytes. In contrast, first perform high-resolution scans with relatively small probes in...

10.1109/isi53945.2021.9624778 article EN 2021-11-02

A measurement method based on the analysis of variance <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">F</i> -statistic is presented to rapidly evaluate cryptographic modules’ vulnerability fine-grained EM side-channel (SCA) attacks. The proposed assumes that evaluators can control device under test set carefully chosen inputs computations interest and repeat measurements as many times needed. It identifies optimal configurations—that...

10.1109/temc.2022.3157664 article EN IEEE Transactions on Electromagnetic Compatibility 2022-04-05

Electromagnetic (EM) fields have been extensively studied as potent side-channel tools for testing the security of hardware implementations. In this work, a low-cost disassembler that uses fine-grained EM signals to predict program's execution trace with high accuracy is proposed. Unlike conventional disassemblers, proposed does not require extensive randomized instantiations instructions profile them, instead relying on leakage-model-informed sub-sampling potential architectural states...

10.1145/3629167 article EN other-oa ACM Transactions on Embedded Computing Systems 2023-10-25

An adaptive acquisition protocol is presented to rapidly identify optimal near-field measurement configurations for performing electromagnetic side-channel analysis attacks on physical implementations of cryptographic modules. Because measured fields vary with probe parameters as well the data being encrypted, identifying requires searching among a large number possible configurations. The proposed multi-step that corresponds greedy search in 4-D configuration space consisting coordinates,...

10.1109/wmcas.2019.8732510 article EN 2019-03-01

The analysis of variance (ANOVA) F-statistic is proposed as a tool to isolate near-field measurement configurations that are sensitive targeted chip processes in embedded systems. It hypothesized the desired have high F-values, i.e., variation target process major contributor whereas obfuscating background and uncertainty minor contributors measured signals. concept demonstrated by isolating data-dependent for commercially available variant 8051 micro-controller: First, multi-stage protocol...

10.1109/emc/si/pi/emceurope52599.2021.9559360 article EN 2021 IEEE International Joint EMC/SI/PI and EMC Europe Symposium 2021-07-26

A two-phase measurement method is presented to evaluate Bluetooth low energy (BLE) modules' vulnerability electromagnetic side-channel analysis attacks. In both phases, signals are collected by probing the fields near surface of a chip that operates as generic attribute profile (GATT) server, while it receives and processes data via Bluetooth. Phase I, first optimal configurations—time intervals, probe positions, orientations—are identified computing analysis-of-variance (ANOVA) F-statistic...

10.1109/wamicon57636.2023.10124916 article EN 2023-04-17

An efficient modeling approach to synthesize near-field EM signals radiated from a general-purpose micro-controller is proposed. The method assumes that for on-chip data computations can be generated using linear combination of basis functions, constructed data-dependent profiles correspond vectors in binary vector space.

10.23919/usnc-ursi54200.2023.10289303 article EN 2023-07-23

The ability of various countermeasures to secure cryptographic modules implementing the Advanced Encryption Standard (AES) algorithm is experimentally evaluated using fine-grained time- and frequency-domain electromagnetic side-channel analysis (EM SCA) attacks. Because an infeasibly large number measurements on-chip EM emanations should be required break protection a cryptosystem, novel approach used keep acquisition costs low while testing system resilience SCA An adaptive scan protocol...

10.1109/iceaa52647.2021.9539534 article EN 2022 International Conference on Electromagnetics in Advanced Applications (ICEAA) 2021-08-09

A statistical method that rapidly identifies near-field probe configurations are ineffective for leaking information from advanced encryption standard (AES) implementations is proposed. The can be used as a pre-characterization stage to accelerate recently introduced multistage analysis of variance (ANOVA)-based measurement protocol evaluating crypto-systems' vulnerability fine-grained EM side-channel attacks.

10.23919/usnc-ursi52669.2022.9887440 article EN 2022-07-10

A simulation model of C-band Variable Optical Attenuator using X-shaped photonic crystal ring resonator is proposed. Tuning achieved through refractive index variation. An attenuation 30dB for 0.0022 change in index.

10.1364/photonics.2016.tu4a.78 article EN 2016-01-01
Coming Soon ...