Analysis of Side-Channel Attack AES Hardware Trojan Benchmarks against Countermeasures
Title | Analysis of Side-Channel Attack AES Hardware Trojan Benchmarks against Countermeasures |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | K, S. K., Sahoo, S., Mahapatra, A., Swain, A. K., Mahapatra, K. K. |
Conference Name | 2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) |
ISBN Number | 978-1-5090-6762-6 |
Keywords | AES benchmark, Benchmark testing, composability, cryptography, cyber physical systems, Encryption, Hardware, hardware security, hardware security issue, hardware trojan, HT benchmark, HT defense, HT design, HT detection, pubcrawl, resilience, Resiliency, Side-channel attack, side-channel attack AES hardware Trojan benchmarks, side-channel attacks, trojan horse detection, Trojan horses |
Abstract | Hardware Trojan (HT) is one of the well known hardware security issue in research community in last one decade. HT research is mainly focused on HT detection, HT defense and designing novel HT's. HT's are inserted by an adversary for leaking secret data, denial of service attacks etc. Trojan benchmark circuits for processors, cryptography and communication protocols from Trust-hub are widely used in HT research. And power analysis based side channel attacks and designing countermeasures against side channel attacks is a well established research area. Trust-Hub provides a power based side-channel attack promoting Advanced Encryption Standard (AES) HT benchmarks for research. In this work, we analyze the strength of AES HT benchmarks in the presence well known side-channel attack countermeasures. Masking, Random delay insertion and tweaking the operating frequency of clock used in sensitive operations are applied on AES benchmarks. Simulation and power profiling studies confirm that side-channel promoting HT benchmarks are resilient against these selected countermeasures and even in the presence of these countermeasures; an adversary can get the sensitive data by triggering the HT. |
URL | https://ieeexplore.ieee.org/document/7987582/ |
DOI | 10.1109/ISVLSI.2017.106 |
Citation Key | k_analysis_2017 |
- HT defense
- Trojan horses
- trojan horse detection
- side-channel attacks
- side-channel attack AES hardware Trojan benchmarks
- Side-channel attack
- Resiliency
- resilience
- pubcrawl
- HT detection
- HT design
- AES benchmark
- HT benchmark
- hardware trojan
- hardware security issue
- Hardware Security
- Hardware
- encryption
- cyber physical systems
- Cryptography
- composability
- Benchmark testing