首页    期刊浏览 2024年10月06日 星期日
登录注册

文章基本信息

  • 标题:Cost-Effective Design Strategies for Securing Embedded Processors
  • 作者:Florent Bruguier ; Pascal Benoit ; Lionel Torres
  • 期刊名称:IEEE Transactions on Emerging Topics in Computing
  • 印刷版ISSN:2168-6750
  • 出版年度:2016
  • 卷号:4
  • 期号:1
  • 页码:60-72
  • DOI:10.1109/TETC.2015.2407832
  • 语种:English
  • 出版社:IEEE Publishing
  • 摘要:

    Side-channel attacks (SCAs), such as differential power analysis or differential electromagnetic analysis, pose a serious threat to the security of embedded systems. In the literature, few articles address the problem of securing general purpose processors (GPPs) with resourceful countermeasures. However, in many low-cost applications, where security is not critical, cryptographic algorithms are typically implemented in software. Since it has been proved that GPPs are vulnerable to SCAs, it is desirable to develop efficient mechanisms to ensure a certain level of security. In this paper, we extend side-channel countermeasures to the register transfer level description. The challenge is to create a new class of processor that executes embedded software applications, which are intrinsically protected against SCAs. For that purpose, we first investigate how to integrate into the datapath two countermeasures based on masking and hiding approaches. Through an FPGA-based processor, we then evaluate the overhead and the effectiveness of the proposed solutions against time-domain first-order attacks. We finally show that a suitable combination of countermeasures significantly increases the side-channel resistance in a cost-effective way.

  • 关键词:cryptography; embedded systems; field programmable gate arrays; FPGA-based processor; GPP; SCA; cost-effective design strategies; cryptographic algorithms; differential electromagnetic analysis; differential power analysis; embedded software applications; embedded systems; general purpose processors; low-cost applications; register transfer level description; resourceful countermeasures; securing embedded processors; side channel attacks; side channel countermeasures; side channel resistance; time-domain first-order attacks; Computer architecture; Cryptography; Hardware; Pipelines; Program processors; Registers; Countermeasures; Cryptography; FPGA; Hiding; Masking; RISC Processor; RISC processor; Side-Channel Attacks; Time-Domain; countermeasures; hiding; masking; side-channel attacks; time-domain
Loading...
联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有