Abstract
The energy dissipation associated with switching in CMOS logic gates can be used to classify the microprocessors activity. It is relatively easy to classify activity by the number of transitions, i.e. Hamming Distance (HD). In this paper we consider layout dependent phenomena, such as capacitive crosstalk to derive a more precise power model. We show that for an 8 bit data bus, crosstalk may improve detection performance from 2.5 bits (HD based detector) to theoretical 5.7 bits and simulated 5.0 bits (crosstalk based detector) of information pr sample. Thus we have shown that a layout specific phenomenon (capacitance) must be considered when analyzing security implications of power and electromagnetic side channels. A small case study has also been carried out that support our simulations/theoretical results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using ic fingerprinting. In: IEEE Symposium on Security and Privacy, pp. 296–310 (2007)
Chari, S., Rao, J.R., Rohatgi, P.: ”template attack”. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13–28. Springer, Heidelberg (2003)
Chen, Z., Haider, S., Schaumont, P.: Side-channel leakage in masked circuits caused by higher-order circuit effects. In: Park, J.H., Chen, H.-H., Atiquzzaman, M., Lee, C., Kim, T.-h., Yeo, S.-S. (eds.) ISA 2009. LNCS, vol. 5576, pp. 327–336. Springer, Heidelberg (2009)
Duan, C., Calle, V.H.C., Khatri, S.P.: Efficient on-chip crosstalk avoidance codec design. IEEE Transaction on Very Large Scale Integration (VLSI) Systems 17(4) (April 2009)
Dyrkolbotn, G.O., Snekkenes, E.: Modified template attack: Detecting address bus signals of equal hamming weight. In: Norsk informasjonssikkerhetskonferanse, NISK 2009 (2009)
Dyrkolbotn, G.O., Snekkenes, E.: A wireless covert channel on smart cards (short paper). In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 249–259. Springer, Heidelberg (2006)
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999), http://www.cryptography.com/dpa/technical/index.html
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attack - Revealing the Secret of Smart Cards. Springer, Heidelberg (2007)
Moll, F., Roca, M., Isern, E.: Analysis of dissipation energy of switching digital cmos gates with coupled outputs. Microelectronics (34), 833–842 (2003)
Quisquater, J.-J., Samyde, D.: Automatic code recognition for smart cards using a kohonen neural network. In: 5th Smart Card Research and Advanced Application Conference, USENIX (2002)
Sotiriadis, P.P., Chandrakasan, A.: Low power bus coding techniques considering inter-wire capacitances. In: Proceedings of the IEEE Custom Integrated Curcuits Conference, pp. 507–510 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dyrkolbotn, G.O., Wold, K., Snekkenes, E. (2011). Security Implications of Crosstalk in Switching CMOS Gates. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds) Information Security. ISC 2010. Lecture Notes in Computer Science, vol 6531. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18178-8_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-18178-8_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-18177-1
Online ISBN: 978-3-642-18178-8
eBook Packages: Computer ScienceComputer Science (R0)