TY - GEN
T1 - Timing attack on NEMS relay based design of AES
AU - Saeed, Samah Mohamed
AU - Mazumdar, Bodhisatwa
AU - Ali, Sk Subidh
AU - Sinanoglu, Ozgur
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/10/30
Y1 - 2015/10/30
N2 - In deep submicron CMOS transistors, the static leakage current has become a significant contributor to power consumption with channel length and subthreshold voltage being continuously scaled down. Also, this increased leakage has recently led to the rise of side-channel attacks on CMOS based implementations. Nanoelectromechanical System (NEMS) relay technology is emerging as an alternative to CMOS with one of its most prominent advantages being the zero static leakage, providing an inherent defense against power side-channel attacks at the same time. On the other hand, this emerging technology introduces timing challenges in the design process; to minimize the timing delay of NEMS relays, binary decision diagram (BDD) based implementation is utilized to design combinational logic. What's important from a security perspective is that the timing delay of the BDD implementation of a NEMS relay based design is inherently input dependent. An adversary can therefore leverage the data dependency to identify secret information of the chip. We propose a timing delay based attack on NEMS relay based designs, use AES as a case study, and show that it can achieve a success rate of 1.0 for interconnect delay variations within a standard deviation of 0.0022. To the best of our knowledge, this paper is the first to expose an inherent security vulnerability of a NEMS relay based design.
AB - In deep submicron CMOS transistors, the static leakage current has become a significant contributor to power consumption with channel length and subthreshold voltage being continuously scaled down. Also, this increased leakage has recently led to the rise of side-channel attacks on CMOS based implementations. Nanoelectromechanical System (NEMS) relay technology is emerging as an alternative to CMOS with one of its most prominent advantages being the zero static leakage, providing an inherent defense against power side-channel attacks at the same time. On the other hand, this emerging technology introduces timing challenges in the design process; to minimize the timing delay of NEMS relays, binary decision diagram (BDD) based implementation is utilized to design combinational logic. What's important from a security perspective is that the timing delay of the BDD implementation of a NEMS relay based design is inherently input dependent. An adversary can therefore leverage the data dependency to identify secret information of the chip. We propose a timing delay based attack on NEMS relay based designs, use AES as a case study, and show that it can achieve a success rate of 1.0 for interconnect delay variations within a standard deviation of 0.0022. To the best of our knowledge, this paper is the first to expose an inherent security vulnerability of a NEMS relay based design.
KW - AES
KW - Binary decision diagram (BDD)
KW - Nanoelectromechanical System (NEMS) relays
KW - Security
KW - Side-channel attack
KW - Timing attack
UR - http://www.scopus.com/inward/record.url?scp=84960104857&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84960104857&partnerID=8YFLogxK
U2 - 10.1109/VLSI-SoC.2015.7314427
DO - 10.1109/VLSI-SoC.2015.7314427
M3 - Conference contribution
AN - SCOPUS:84960104857
T3 - IEEE/IFIP International Conference on VLSI and System-on-Chip, VLSI-SoC
SP - 264
EP - 269
BT - 2015 IFIP/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2015
PB - IEEE Computer Society
T2 - 23rd IFIP/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2015
Y2 - 5 October 2015 through 7 October 2015
ER -