skip to main content
10.1145/1629911.1629977acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

Analysis and mitigation of process variation impacts on Power-Attack Tolerance

Published:26 July 2009Publication History

ABSTRACT

Embedded cryptosystems show increased vulnerabilities to implementation attacks such as power analysis. CMOS technology trends are causing increased process variations which impact the data-dependent power of deep submicron cryptosystem designs. In this paper, we use Monte Carlo methods in SPICE circuit simulations to analyze the statistical properties of the data-dependent power with predictive 45nm CMOS device and ITRS process variation models. In addition to the "measurement to disclosure" (MTD) used in [3], we define a lower level metric, Power-Attack Tolerance (PAT), to model both dynamic power and leakage power data-dependence. We show that the PAT of a typical cryptographic component implementation using CMOS standard-cells can significantly deteriorate due to process variations, thus increasing the component's vulnerability to power attacks. Power-attack-resistant logic styles (e.g. SABL [9]) have been developed which increase PAT by an order of magnitude by balancing power consumption at the gate level with considerable overhead. However in the presence of process variations, the degradation probability of MTD is 57%. To mitigate this problem, we demonstrate a transistor sizing optimization method that can reduce such negative impacts to only 18% with minimal power and area overhead.

References

  1. P. Kocher, J. Jaffe, B. Jun, "Differential Power Analysis", CRYPTO, LNCS 1666, pp. 388--397, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Mangard, "Hardware Countermeasures Against DPA -- A Statistical Analysis of Their Effectiveness", CT-RSA, LNCS 2964, pp. 222--235, 2004.Google ScholarGoogle Scholar
  3. K. Tiri, I. Verbauwhede, "A digital design flow for secure integrated circuits," IEEE Transaction on CAD, vol. 25(7), pp. 1197--1208, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. K. Tiri, I. Verbauwhede, "Simulation models for side-channel information leaks," ACM/IEEE DAC, pp. 228--233, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. L. Lin, W. Burleson, "Leakage-based differential power analysis (LDPA) on sub-90nm CMOS cryptosystems", IEEE ISCAS, pp. 252--255, 2008.Google ScholarGoogle Scholar
  6. J. Tschanz, J. Kao, S. Narendra, R. Nair, D. Antoniadis, A. Chandrakasan, V. De, "Adaptive body bias for reducing impacts of die-to-die and within-die parameter variations on microprocessor frequency and leakage," IEEE Journal of Solid-State Circuits, Vol. 37(11), pp. 1396--1402, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  7. K. Tiri, "Side-channel attack pitfalls," ACM/IEEE DAC, pp. 15--20, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, B. Sunar, "Trojan detection using IC fingerprinting," IEEE Symposium on Security and Privacy, pp. 296--310, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. K. Tiri, I. Verbauwhede, "Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology," CHES, LNCS, vol. 2779, pp. 125--136, 2003.Google ScholarGoogle Scholar
  10. P. Yu, P. Schaumont, "Secure FPGA circuits using controlled placement and routing," ACM/IEEE CODES+ISSS, pp. 45--50, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Mukhopadhyay, K. Roy, "Modeling and estimation of total leakage current in nano-scaled CMOS devices considering the effect of parameter variation," ACM/IEEE ISLPED, pp. 172--175, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R. Rao, A. Srivastava, D. Blaauw, D. Sylvester, "Statistical estimation of leakage current considering inter- and intra-die process variation," ACM/IEEE ISLPED, pp. 84--89, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. International Technology Roadmap for Semiconductors, 2006, http://public.itrs.net.Google ScholarGoogle Scholar
  14. W. Zhao, Y. Cao, "New generation of predictive technology model for sub-45nm design exploration," IEEE ISQED, pp. 585--590, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. W. Mendenhall, and T. Sincich, "Statistics for engineering and the sciences," 5th edition, by Prentice Hall, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Bhunia, S. Mukhopadhyay, K. Roy, "Process variations and process-tolerant design," IEEE VLSI Design, pp. 699--704, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. K. Takeuchi, T. Tatsumi, A. Furukawa, "Channel engineering for the reduction of random-dopant-placement-induced threshold voltage fluctuation," IEEE IEDM, pp. 841--844, 1997.Google ScholarGoogle Scholar
  18. R. Brodersen, M. Horowitz, D. Markovic, B. Nikolic, V. Stojanovic, "Methods for true power minimization", ACM/IEEE ICCAD, pp. 35--42, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P. Gupta, A. Kahng, P. Sharma, D. Sylvester, "Selective gate-level biasing for cost-effective runtime leakage control," ACM/IEEE DAC, pp. 327--330, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Analysis and mitigation of process variation impacts on Power-Attack Tolerance

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            DAC '09: Proceedings of the 46th Annual Design Automation Conference
            July 2009
            994 pages
            ISBN:9781605584973
            DOI:10.1145/1629911

            Copyright © 2009 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 26 July 2009

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate1,770of5,499submissions,32%

            Upcoming Conference

            DAC '24
            61st ACM/IEEE Design Automation Conference
            June 23 - 27, 2024
            San Francisco , CA , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader