CryptoDB

Paper: Exploring the Effect of Device Aging on Static Power Analysis Attacks

Authors: Naghmeh Karimi , University of Maryland, Baltimore County Thorben Moos , Ruhr University Bochum, Horst Görtz Institute for IT Security Amir Moradi , Ruhr University Bochum, Horst Görtz Institute for IT Security DOI: 10.13154/tches.v2019.i3.233-256 URL: https://tches.iacr.org/index.php/TCHES/article/view/8295 Search ePrint Search Google Slides Vulnerability of cryptographic devices to side-channel analysis attacks, and in particular power analysis attacks has been extensively studied in the recent years. Among them, static power analysis attacks have become relevant with moving towards smaller technology nodes for which the static power is comparable to the dynamic power of a chip, or even dominant in future technology generations. The magnitude of the static power of a chip depends on the physical characteristics of transistors (e.g., the dimensions) as well as operating conditions (e.g., the temperature) and the electrical specifications such as the threshold voltage. In fact, the electrical specifications of transistors deviate from their originally intended ones during device lifetime due to aging mechanisms. Although device aging has been extensively investigated from reliability point of view, the impact of aging on the security of devices, and in particular on the vulnerability of devices to power analysis attacks are yet to be considered.This paper fills the gap and investigates how device aging can affect the susceptibility of a chip exposed to static power analysis attacks. To this end, we conduct both, simulation and practical experiments on real silicon. The experimental results are extracted from a realization of the PRESENT cipher fabricated using a 65nm commercial standard cell library. The results show that the amount of exploitable leakage through the static power consumption as a side channel is reduced when the device is aged. This can be considered as a positive development which can (even slightly) harden such static power analysis attacks. Additionally, this result is of great interest to static power side-channel adversaries since state-of-the-art leakage current measurements are conducted over long time periods under increased working temperatures and supply voltages to amplify the exploitable information, which certainly fuels aging-related device degradation.
BibTeX
@article{tches-2019-29325,
title={Exploring the Effect of Device Aging on Static Power Analysis Attacks},
journal={IACR Transactions on Cryptographic Hardware and Embedded Systems},
publisher={Ruhr-Universität Bochum},
volume={2019, Issue 3},
pages={233-256},
url={https://tches.iacr.org/index.php/TCHES/article/view/8295},
doi={10.13154/tches.v2019.i3.233-256},
author={Naghmeh Karimi and Thorben Moos and Amir Moradi},
year=2019
}