When Failure Analysis Meets Side-Channel Attacks

Abstract : The purpose of failure analysis is to locate the source of a defect in order to characterize it, using different techniques (laser stim- ulation, light emission, electromagnetic emission...). Moreover, the aim of vulnerability analysis, and particularly side-channel analysis, is to ob- serve and collect various leakages information of an integrated circuit (power consumption, electromagnetic emission ...) in order to extract sensitive data. Although these two activities appear to be distincted, they have in common the observation and extraction of information about a circuit behavior. The purpose of this paper is to explain how and why these activities should be combined. Firstly it is shown that the leak- age due to the light emitted during normal operation of a CMOS circuit can be used to set up an attack based on the DPA/DEMA technique. Then a second method based on laser stimulation is presented, improv- ing the “traditional” attacks by injecting a photocurrent, which results in a punctual increase of the power consumption of a circuit. These tech- niques are demonstrated on an FPGA device.
Type de document :
Communication dans un congrès
Lecture Notes in Computer Science. CHES'10: Cryptographic Hardware and Embedded System, Aug 2010, Santa Barbara, United States. Springer Verlag, 6225/2010, pp.188-202, 2010, 〈http://www.iacr.org/workshops/ches/ches2010/start.html〉. 〈10.1007/978-3-642-15031-9〉
Liste complète des métadonnées

Littérature citée [20 références]  Voir  Masquer  Télécharger

https://hal-lirmm.ccsd.cnrs.fr/lirmm-00532636
Contributeur : Bruno Rouzeyre <>
Soumis le : jeudi 4 novembre 2010 - 11:58:08
Dernière modification le : mardi 26 juin 2018 - 01:18:39
Document(s) archivé(s) le : samedi 5 février 2011 - 02:49:21

Fichier

62250188_editing_version.pdf
Fichiers produits par l'(les) auteur(s)

Identifiants

Collections

Citation

Jérôme Di Battista, Jc Courrège, Bruno Rouzeyre, Lionel Torres, Philippe Perdu. When Failure Analysis Meets Side-Channel Attacks. Lecture Notes in Computer Science. CHES'10: Cryptographic Hardware and Embedded System, Aug 2010, Santa Barbara, United States. Springer Verlag, 6225/2010, pp.188-202, 2010, 〈http://www.iacr.org/workshops/ches/ches2010/start.html〉. 〈10.1007/978-3-642-15031-9〉. 〈lirmm-00532636〉

Partager

Métriques

Consultations de la notice

392

Téléchargements de fichiers

275