ABSTRACT
Differential power analysis (DPA) has been shown to be the dominant type of side-channel attacks that significantly jeopardize the security in integrated circuits. It has been shown that the data, the functional unit operations as well as the internal micro-architectures can be detected through current and power analysis. Subsequently, different CMOS logic styles have been proposed in the literature for performing computations in such a manner that the current and power signatures can be concealed through reduction of the variance in transient power dissipation. In this work, we propose a gate sizing formulation based on traditional static CMOS standard cells that improves the security of the circuits while maintaining low overheads in terms of area, power and delay. The proposed algorithm considers all disjoint paths from primary inputs to the primary outputs, performing gate sizing with the objective of balancing the switched path capacitances among the various paths making it difficult to extract power or current signatures through current or power profiling. Further, we show that the path based security aware gate sizing formulation is NP-complete and propose a greedy approximation algorithm based on linear programming. The proposed algorithm has been implemented and validated on the ISCAS85 benchmarks and the experimental results indicate a reduction of the variance of transient dynamic power by about 40% with very low overhead in terms of delay, area and power.
- M. Berkelaar and J. Jess. Gate sizing in mos digital circuits with linear programming. Proc. of EDAC, pages 217--221, 1990. Google Scholar
Digital Library
- J. Fishburn and A. Dunlop. Tilos: A posynomial programming approach to transistor sizing. Proc. of ICCAD, pages 326--328, 1985.Google Scholar
- N. Hanchate and N. Ranganathan. Simultaneous interconnect delay and crosstalk noise optimization through gate sizing using game theory. Trans. on Computers, 55(8):1011--1023, 2006. Google Scholar
Digital Library
- P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. Proc. of Intl. Cryptology Conf. on Advances in Cryptology, pages 388--397, 1999. Google Scholar
Digital Library
- O. Kommerling and M. Kuhn. Design principles for tamper-resistant smartcard processors. Workshop on Smartcard Technology, pages 9--20, 1999. Google Scholar
Digital Library
- V. Mahalingam, N. Ranganathan, and J. Harlow III. A novel approach for variation aware power minimization during gate sizing. Proc. of ISLPED, pages 174--179, 2006. Google Scholar
Digital Library
- M. Mani and M. Orshansky. A new statistical optimization algorithm for gate sizing. Proc. of ICCD, pages 272--277, 2004. Google Scholar
Digital Library
- A. Murugavel and N. Ranganathan. Gate sizing and buffer insertion using economic models for power optimization. Proc. of Intl. Conf. on VLSI Design, pages 195--200, 2004. Google Scholar
Digital Library
- S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady. Security in embedded systems: Design challenges. Trans. on Embedded Computing Systems, pages 361--391, 2004. Google Scholar
Digital Library
- S. Sapatnekar, V. Rao, and P. Vaidya. An exact solution to the transistor sizing problem for cmos circuits using convex optimization. Trans. on CAD, 12(11):1621--1634, 1993.Google Scholar
Digital Library
- J. Singh, V. Nookala, Z. Luo, and S. Sapatnekar. Robust gate sizing by geometric programming. Proc. of DAC, pages 315--320, 2005. Google Scholar
Digital Library
- D. Sinha and H. Zhou. Gate sizing for crosstalk reduction under timing constraints by lagrangian relaxation. Proc. of ICCAD, pages 14--19, 2004. Google Scholar
Digital Library
- K. Tiri and I. Verbauwhede. A dynamic and differential cmos logic with signal independent power consumption to withstand differential power analysis on smart cards. Proc. of Conf. of Solid--State Circuits, 2002.Google Scholar
- K. Tiri and I. Verbauwhede. A logic level design methology for a secure dpa resistant asic or fpga implementation. Proc. of DATE, pages 246--251, 2004. Google Scholar
Digital Library
- K. Tiri and I. Verbauwhede. A digital design flow for secure integrated circuits. Trans. on CAD, 25(7):1197--1208, 2006. Google Scholar
Digital Library
- X. Yang and K. Saluja. Combating nbti degradation via gate sizing. Proc. of ISQED, pages 47--52, 2007. Google Scholar
Digital Library
- Q. Zhou and K. Mohanram. Gate sizing to radiation harden combinational logic. Trans. on CAD, 25(1):155--166, 2006. Google Scholar
Digital Library
Index Terms
A linear programming formulation for security-aware gate sizing
Recommendations
Gate sizing: finFETs vs 32nm bulk MOSFETs
DAC '06: Proceedings of the 43rd annual Design Automation ConferenceFinFET devices promise to replace traditional MOSFETs because of superior ability in controlling leakage and minimizing short channel effects while delivering a strong drive current. We investigate in this paper gate sizing of finFET devices, and we ...
Reliability Aware Gate Sizing Combating NBTI and Oxide Breakdown
VLSID '14: Proceedings of the 2014 27th International Conference on VLSI Design and 2014 13th International Conference on Embedded SystemsNegative Bias Temperature Instability (NBTI) and Oxide Breakdown (OBD) are two key reliability concerns for nanometer VLSI circuits. Gate over-sizing has been done in the past to mitigate the effect of NBTI and aging to meet performance constraints. ...
NBTI-aware adaptive minimum leakage vector selection using a linear programming approach
Due to the circuit aging effect, the minimum leakage vector (MLV) found by the traditional input vector control method may not obtain the optimal leakage power reduction result when the circuit begins to degrade. To solve this problem, we present an ...





Comments