TY - GEN
T1 - Enhancing reactive countermeasure against em attacks with low overhead
AU - Ishihata, Daisuke
AU - Homma, Naofumi
AU - Hayashi, Yu Ichi
AU - Miura, Noriyuki
AU - Fujimoto, Daisuke
AU - Nagata, Makoto
AU - Aoki, Takafumi
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/10/20
Y1 - 2017/10/20
N2 - This paper proposes a method for improving Electromagnetic (EM) attack sensor precision for countering a wider range of EM attacks on cryptographic modules. During an attack, an EM attack sensor determines the proximity of a probe to an LSI chip by detecting a change in the mutual inductance between the probe and the LSI chip from the shift in the oscillation frequency of the LC oscillator of the sensor. The subsequent would-be attack is thwarted by instantaneous detection of the proximity of the probe. We show that smaller oscillation frequency shifts can be detected by extending the time required for the detection process, and demonstrate that extending the time enables attacks to be detected even when they are coming from the back surface of the LSI chip, which was earlier difficult to achieve. We then examine the possibility of operating the crypto core and sensor simultaneously as a method for reducing the performance overheads of the proposed system. Through evaluation experiments, we show that the simultaneous operation of the crypto core and sensor has no significant effect on the precision of probe detection. Furthermore, we discuss an alternative method for improving the detection sensitivity by a time-to-digital converter without extending the detection process time.
AB - This paper proposes a method for improving Electromagnetic (EM) attack sensor precision for countering a wider range of EM attacks on cryptographic modules. During an attack, an EM attack sensor determines the proximity of a probe to an LSI chip by detecting a change in the mutual inductance between the probe and the LSI chip from the shift in the oscillation frequency of the LC oscillator of the sensor. The subsequent would-be attack is thwarted by instantaneous detection of the proximity of the probe. We show that smaller oscillation frequency shifts can be detected by extending the time required for the detection process, and demonstrate that extending the time enables attacks to be detected even when they are coming from the back surface of the LSI chip, which was earlier difficult to achieve. We then examine the possibility of operating the crypto core and sensor simultaneously as a method for reducing the performance overheads of the proposed system. Through evaluation experiments, we show that the simultaneous operation of the crypto core and sensor has no significant effect on the precision of probe detection. Furthermore, we discuss an alternative method for improving the detection sensitivity by a time-to-digital converter without extending the detection process time.
KW - EM analysis attack
KW - EM attack sensor
KW - Side-channel attack
KW - countermeasure technology
UR - http://www.scopus.com/inward/record.url?scp=85039170917&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85039170917&partnerID=8YFLogxK
U2 - 10.1109/ISEMC.2017.8077903
DO - 10.1109/ISEMC.2017.8077903
M3 - Conference contribution
AN - SCOPUS:85039170917
T3 - IEEE International Symposium on Electromagnetic Compatibility
SP - 399
EP - 404
BT - 2017 IEEE International Symposium on Electromagnetic Compatibility, Signal and Power Integrity, EMCSI 2017 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2017 IEEE International Symposium on Electromagnetic Compatibility, Signal and Power Integrity, EMCSI 2017
Y2 - 7 August 2017 through 11 August 2017
ER -