Anupam Golder

ORCID: 0000-0003-0725-1593
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Chaos-based Image/Signal Encryption
  • Advanced Malware Detection Techniques
  • Cryptography and Data Security
  • Advanced Memory and Neural Computing
  • Security and Verification in Computing
  • Digital Media Forensic Detection
  • Coding theory and cryptography
  • Wireless Signal Modulation Classification
  • Advancements in Semiconductor Devices and Circuit Design
  • Quantum Computing Algorithms and Architecture
  • CCD and CMOS Imaging Sensors
  • Fractal and DNA sequence analysis
  • Cryptography and Residue Arithmetic
  • VLSI and Analog Circuit Testing
  • Privacy-Preserving Technologies in Data
  • Integrated Circuits and Semiconductor Failure Analysis
  • Stochastic Gradient Optimization Techniques
  • Radiation Effects in Electronics

Georgia Institute of Technology
2019-2025

Intel (United States)
2024

Carnegie Mellon University
2023

Atlanta Technical College
2022

Beijing Microelectronics Technology Institute
2022

National University of Defense Technology
2022

Kennesaw State University
2022

This article, for the first time, demonstrates Cross-device Deep Learning Side-Channel Attack (X-DeepSCA), achieving an accuracy of > 99.9%, even in presence significantly higher inter-device variations compared to inter-key variations. Augmenting traces captured from multiple devices training and with proper choice hyper-parameters, proposed 256-class Neural Network (DNN) learns accurately power side-channel leakage AES-128 target encryption engine, N-trace (N ≤ 10) X-DeepSCA attack breaks...

10.1145/3316781.3317934 article EN 2019-05-23

Power side-channel analysis (SCA) has been of immense interest to most embedded designers evaluate the physical security system. This work presents profiling-based cross-device power SCA attacks using deep learning techniques on 8-bit AVR microcontroller devices running AES-128. Firstly, we show practical issues that arise in these due significant device-to-device variations. Secondly, utilizing Principal Component Analysis (PCA) based pre-processing and multi-device training, a Multi-Layer...

10.1109/tvlsi.2019.2926324 article EN publisher-specific-oa IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2019-07-26

Mathematically secure cryptographic algorithms, when implemented on a physical substrate, leak critical "side-channel" information, leading to power and electromagnetic (EM) analysis attacks. Circuit-level protections involve switched capacitor, buck converter, or series low-dropout (LDO) regulator-based implementations, each of which suffers from significant power, area, performance tradeoffs has only achieved minimum traces disclosure (MTD) 10M till date. Utilizing an in-depth white-box...

10.1109/jssc.2020.3032975 article EN publisher-specific-oa IEEE Journal of Solid-State Circuits 2020-11-25

Computationally-secure cryptographic algorithms when implemented on physical platforms leak critical signals correlated with the secret key in form of power consumption and electromagnetic (EM) emanations. This can be exploited by an adversary, leading to side-channel attacks (SCA) that recover key. Circuit-level on-chip countermeasures include a switched-capacitor current equalizer [1], charge-recovery logic [2], integrated voltage regulator (IVR) [3], all-digital low-dropout (LDO) [4],...

10.1109/isscc19947.2020.9062997 article EN 2022 IEEE International Solid- State Circuits Conference (ISSCC) 2020-02-01

This work presents a Cross-device Deep-Learning based Electromagnetic (EM-X-DL) side-channel analysis (SCA) on AES-128, in the presence of significantly lower signal-to-noise ratio (SNR) compared to previous works. Using novel algorithm intelligently select multiple training devices and proper choice hyperparameters, proposed 256-class deep neural network (DNN) can be trained efficiently utilizing pre-processing techniques like PCA, LDA, FFT measurements from target encryption engine running...

10.1145/3465380 article EN ACM Journal on Emerging Technologies in Computing Systems 2021-09-29

This letter describes a Delta-Sigma ADC based Power-Side-Channel-Attack Sensor. Use of 64 sampling capacitors allows the use over-sampling architecture even with decoupling capacitor connected to power supply. The LDO low-leakage S/H is used as driver for integrator's amplifier minimize offset error. A differential conversion method utilizing Dual-Integrate (CAPs) provides signal processing compensate drift due supply voltage (VDD) variations. prototype sensor chip fabricated in 65nm CMOS...

10.1109/lssc.2025.3527153 article EN IEEE Solid-State Circuits Letters 2025-01-01

As machine learning (ML) permeates fields like healthcare, facial recognition, and blockchain, the need to protect sensitive data intensifies. Fully Homomorphic Encryption (FHE) allows inference on encrypted data, preserving privacy of both ML model. However, it slows down non-secure by up five magnitudes, with a root cause replacing non-polynomial operators (ReLU MaxPooling) high-degree Polynomial Approximated Function (PAF). We propose SmartPAF, framework replace low-degree PAF then...

10.48550/arxiv.2404.03216 preprint EN arXiv (Cornell University) 2024-04-04

This article, for the first time, demonstrates an efficient circuit-level countermeasure to prevent deep-learning based side-channel analysis (DLSCA) attacks on encryption devices. Machine learning (ML) SCA, particularly DLSCA have been shown be extremely effective as it can potentially reveal secret key of cryptographic device with low a single trace, by offloading heavy-lifting profiling phase where model learns correlated leakage patterns key. work presents current-domain signature...

10.1109/cicc48029.2020.9075889 article EN 2022 IEEE Custom Integrated Circuits Conference (CICC) 2020-03-01

This paper presents SNOW-SCA, the first power side-channel analysis (SCA) attack of a 5G mobile communication security standard candidate, SNOW-V, running on 32-bit ARM Cortex-M4 microcontroller. First, we perform generic known-key correlation (KKC) to identify leakage points. Next, (CPA) is performed, which reduces complexity two key guesses for each byte. The correct secret then uniquely identified utilizing linear discriminant (LDA). profiled SCA with LDA achieves 100% accuracy after...

10.1109/host55342.2024.10545384 article EN 2024-05-06

Countermeasures against power side-channel attack (SCA) range from algorithmic modifications to modifying the consumption characteristics of device by inclusion noise sources or suppressing current signature. However, these techniques are, in most cases, passive protection and come with unacceptable area overheads for resource-constrained devices. In this letter, we propose a SCA detection sensor based on 1-b delta-sigma analog-to-digital converter, which allows an ongoing within as fast...

10.1109/lsens.2023.3259301 article EN IEEE Sensors Letters 2023-03-20

In this work, we present a comprehensive analysis of explainability Neural Network (NN) models in the context power Side-Channel Analysis (SCA), to gain insight into which features or Points Interest (PoI) contribute most classification decision. Although many existing works claim state-of-the-art accuracy recovering secret key from cryptographic implementations, it remains be seen whether actually learn representations leakage points. evaluated reasoning behind success NN model, by...

10.1145/3526241.3530346 article EN Proceedings of the Great Lakes Symposium on VLSI 2022 2022-06-02

Manufacturing variability demonstrates significant variations in dynamic power consumption profiles during program execution, even if the printed circuit boards (PCB) are identical and processors execute same operations on data. In this work, we show how can be leveraged to benefit of manufacturers by utilizing machine learning (ML) based PCB identification. The proposed technique achieves 100% accuracy identifying PCBs from their traces after training a linear discriminant analysis (LDA)...

10.1109/aicas57966.2023.10168655 article EN 2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS) 2023-06-11

This work presents a power side-channel analysis (SCA) of lightweight cryptography (LWC) algorithm, XOODYAK, implemented on an FPGA. First, we perform generic leakage detection tests for two phases authenticated encryption with associated data (AEAD) mode, namely INITIALIZE, and ABSORB. Second, develop novel hypothetical attack models correlation (CPA) demonstrate success rate (SR) 92%/82% minimum-traces-to-disclosure (MTD)=13K/38K the INITIALIZE/ABSORB phases, respectively. Third, evaluate...

10.1109/dac56929.2023.10247916 article EN 2023-07-09

Abstract Machine learning (ML) is getting more pervasive. Wide adoption of ML in healthcare, facial recognition, and blockchain involves private sensitive data. One the most promising candidates for inference on encrypted data, termed Fully Homomorphic Encryp-tion (FHE), preserves privacy both data model. However, it slows down plaintext by six magnitudes, with a root cause replacing non-polynomial operators latency-prohibitive 27-degree Polynomial Approximated Function (PAF). While prior...

10.21203/rs.3.rs-2910088/v1 preprint EN cc-by Research Square (Research Square) 2023-05-11

This paper presents SNOW-SCA, the first power side-channel analysis (SCA) attack of a 5G mobile communication security standard candidate, SNOW-V, running on 32-bit ARM Cortex-M4 microcontroller. First, we perform generic known-key correlation (KKC) to identify leakage points. Next, (CPA) is performed, which reduces complexity two key guesses for each byte. The correct secret then uniquely identified utilizing linear discriminant (LDA). profiled SCA with LDA achieves 100% accuracy after...

10.48550/arxiv.2403.08267 preprint EN arXiv (Cornell University) 2024-03-13

In this work, we present a high-performance architecture for Discrete Gaussian (DG) sampling used in lattice-based cryptography (LBC) through lookup table (LUT) optimization the combinational datapath as well FPGA aware pipelining to reduce resource utilization and decrease latency. The proposed tree-splitting technique translates discrete distribution generating (DDG) tree Knuth-Yao-based non-uniform into LUT-based logic with pipelined architecture. This allows reduction area-time product...

10.1145/3583781.3590304 article EN Proceedings of the Great Lakes Symposium on VLSI 2022 2023-05-31

This work presents a Cross-device Deep-Learning based Electromagnetic (EM-X-DL) side-channel analysis (SCA), achieving >90% single-trace attack accuracy on AES-128, even in the presence of significantly lower signal-to-noise ratio (SNR), compared to previous works. With an intelligent selection multiple training devices and proper choice hyperparameters, proposed 256-class deep neural network (DNN) can be trained efficiently utilizing pre-processing techniques like PCA, LDA, FFT target...

10.48550/arxiv.2011.06139 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Traditional public-key cryptographic schemes are soon going to be replaced with Post-Quantum Cryptographic (PQC) ensure security guarantees in a Quantum Computing-enabled world. While Computing will help solve many hard problems intractable by classical computing paradigm, it also compromise the that traditional built upon. Among National Institute of Standards and Technology (NIST) finalist PQC schemes, SABER Key Encapsulation Mechanism (KEM) is only one based on Module Learning With...

10.1109/orss55359.2022.9806031 article EN 2022-04-27

In order to improve the reliability of SRAM-based field programmable gate array (FPGA) in various harsh environments, an FPGA online fault location method with high accuracy needs studying support subsequent tolerance technologies.To achieve location, it is necessary overcome a series limitations such as lack hardware resources and user design knowledge.Therefore, this paper proposes black box based on meshed bitstream copy.Generally, linear feedback shift register (LFSR) used...

10.1109/orss55359.2022.9806040 article EN 2022-04-27
Coming Soon ...