Back to Search
Start Over
Side-Channel Attacks
- Source :
- Analog Circuits and Signal Processing ISBN: 9783030153335
- Publication Year :
- 2019
- Publisher :
- Springer International Publishing, 2019.
-
Abstract
- Apart from the previously mentioned attacks that exploit the algorithmic weaknesses of logic locking techniques, logic locking is also vulnerable to the emerging class of side-channel attacks, which are the focus of this chapter. The chapter introduces four attacks on logic locking that exploit various side-channels to extract secret key. The differential power analysis attack utilizes the power consumption of a chip to determine the secret logic locking key. The test-data mining attack and the hill climbing attack determine the secret key from the test data. The de-synthesis attack extracts the key by leveraging the traces left in a netlist during logic synthesis.
- Subjects :
- 021110 strategic, defence & security studies
Focus (computing)
Exploit
Computer science
0211 other engineering and technologies
02 engineering and technology
Computer security
computer.software_genre
020202 computer hardware & architecture
Power analysis
Logic synthesis
0202 electrical engineering, electronic engineering, information engineering
Key (cryptography)
Netlist
Side channel attack
computer
Hill climbing
Subjects
Details
- ISBN :
- 978-3-030-15333-5
- ISBNs :
- 9783030153335
- Database :
- OpenAIRE
- Journal :
- Analog Circuits and Signal Processing ISBN: 9783030153335
- Accession number :
- edsair.doi...........40dadbbbdcd18f7285154c90a3100235