Texto completo
|
PDF (Portable Document Format)
- Se necesita un visor de ficheros PDF, como GSview, Xpdf o Adobe Acrobat Reader
Descargar (1MB) |
ORCID: https://orcid.org/0000-0002-5261-5491 and García Otero, Mariano
ORCID: https://orcid.org/0000-0001-6304-0630
(2022).
Methodology for complete decorrelation of power supply em side-channel signal and sensitive data.
"IEEE Transactions on Circuits and Systems II-Express Briefs", v. 69
(n. 4);
pp. 2256-2260.
ISSN 1549-7747.
https://doi.org/10.1109/TCSII.2022.3144071.
| Título: | Methodology for complete decorrelation of power supply em side-channel signal and sensitive data |
|---|---|
| Autor/es: |
|
| Tipo de Documento: | Artículo |
| Título de Revista/Publicación: | IEEE Transactions on Circuits and Systems II-Express Briefs |
| Fecha: | Abril 2022 |
| ISSN: | 1549-7747 |
| Volumen: | 69 |
| Número: | 4 |
| Materias: | |
| Palabras Clave Informales: | Security; price theorem; side-channel attacks; switched-capacitor DC-DC converters; signal statistics. |
| Escuela: | E.T.S.I. Telecomunicación (UPM) |
| Departamento: | Ingeniería Electrónica |
| Licencias Creative Commons: | Reconocimiento |
|
PDF (Portable Document Format)
- Se necesita un visor de ficheros PDF, como GSview, Xpdf o Adobe Acrobat Reader
Descargar (1MB) |
Electro-magnetic (EM) side channel attacks have become a serious threat to security of Internet-of-Things (IoT) devices. Power supply generated by voltage regulators is one of the most common attack targets due to its strong EM emanations. In this brief we derive analytical conditions for complete theoretical decorrelation of the power supply EM side-channel signal and the sensitive data. The output of the power supply converter is modelled as amplitude modulation (AM) of the load signal by the converter capacitance that acts as a carrier. By applying Price theorem (Papoulis and Pillai, 2002), we obtain the exact theoretical conditions that converter capacitance needs to fulfil in order to prevent EM side-channel attacks. The conditions are further adapted for practical implementation. When the proposed methodology is applied to AES measured traces, the correlation coefficient between the leaked signal and the sensitive data is 0.05. Such low correlation indicates the proposed methodology is a promising candidate against the attacks that exploit AM signals to extract sensitive data, such as, TEMPEST and active EM attacks. Test Vector Leakage Assessment (TVLA) rho-test detects no leaky points, thereby confirming circuit protection against differential and correlation EM attacks as well.
| ID de Registro: | 86336 |
|---|---|
| Identificador DC: | https://oa.upm.es/86336/ |
| Identificador OAI: | oai:oa.upm.es:86336 |
| URL Portal Científico: | https://portalcientifico.upm.es/es/ipublic/item/9914513 |
| Identificador DOI: | 10.1109/TCSII.2022.3144071 |
| URL Oficial: | https://ieeexplore.ieee.org/document/9684565 |
| Depositado por: | iMarina Portal Científico |
| Depositado el: | 20 Ene 2025 11:35 |
| Ultima Modificación: | 21 Ene 2025 09:00 |
Publicar en el Archivo Digital desde el Portal Científico