Side-channel attacks constitute a concrete threat to IoT systems-on-a-chip (SoCs). Embedded memories implemented with 6T SRAM macrocells often dominate the area and power consumption of these SoCs. Regardless of the computational platform, the side-channel sensitivity of low-hierarchy cache memories can incur significant overhead to protect the memory content (i.e., data encryption, data masking, etc.). In this manuscript, we provide a silicon proof of the effectiveness of a low cost side-channel attack protection that is embedded within the memory macro to achieve a significant reduction in information leakage. The proposed solution incorporates low-cost impedance randomization units, which are integrated into the periphery of a convention...
Moore’s law has, for almost half a century, described a trend in which the number of transistors in ...
Passing messages to soldiers on the battle field, conducting online banking, and downloading files o...
Remote side-channel attacks on processors exploit hardware and micro-architectural effects observabl...
Power analysis attacks are an effective tool to extract sensitive information using side-channel ana...
International audienceIn the vulnerability analysis of System on Chips, memory hierarchy is consider...
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the most valu...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
In this digital world, everything is inculcated within technology which increases the importance of ...
International audienceOn-chip memories, and in particular SRAMs, are among the most critical compone...
Embedded systems are ubiquitous and widely used in a large spectrum of applications. Sensitive and s...
Abstract. By shrinking the technology and reducing the energy require-ments of integrated circuits, ...
Emerging Non-Volatile Memories (NVMs) such as Magnetic RAM (MRAM), Spin-Transfer Torque RAM (STTRAM)...
As increasingly important modules in modern embedded systems, cryptographic circuits rely on provabl...
As increasingly important modules in modern embedded systems, cryptographic circuits rely on provabl...
The security of Internet of Things (IoT) devices relies on fundamental concepts such as cryptographi...
Moore’s law has, for almost half a century, described a trend in which the number of transistors in ...
Passing messages to soldiers on the battle field, conducting online banking, and downloading files o...
Remote side-channel attacks on processors exploit hardware and micro-architectural effects observabl...
Power analysis attacks are an effective tool to extract sensitive information using side-channel ana...
International audienceIn the vulnerability analysis of System on Chips, memory hierarchy is consider...
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the most valu...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
In this digital world, everything is inculcated within technology which increases the importance of ...
International audienceOn-chip memories, and in particular SRAMs, are among the most critical compone...
Embedded systems are ubiquitous and widely used in a large spectrum of applications. Sensitive and s...
Abstract. By shrinking the technology and reducing the energy require-ments of integrated circuits, ...
Emerging Non-Volatile Memories (NVMs) such as Magnetic RAM (MRAM), Spin-Transfer Torque RAM (STTRAM)...
As increasingly important modules in modern embedded systems, cryptographic circuits rely on provabl...
As increasingly important modules in modern embedded systems, cryptographic circuits rely on provabl...
The security of Internet of Things (IoT) devices relies on fundamental concepts such as cryptographi...
Moore’s law has, for almost half a century, described a trend in which the number of transistors in ...
Passing messages to soldiers on the battle field, conducting online banking, and downloading files o...
Remote side-channel attacks on processors exploit hardware and micro-architectural effects observabl...