Back to Search Start Over

Side-Channel Attacks

Authors :
Jeyavijayan Rajendran
Muhammad Yasin
Ozgur Sinanoglu
Source :
Analog Circuits and Signal Processing ISBN: 9783030153335
Publication Year :
2019
Publisher :
Springer International Publishing, 2019.

Abstract

Apart from the previously mentioned attacks that exploit the algorithmic weaknesses of logic locking techniques, logic locking is also vulnerable to the emerging class of side-channel attacks, which are the focus of this chapter. The chapter introduces four attacks on logic locking that exploit various side-channels to extract secret key. The differential power analysis attack utilizes the power consumption of a chip to determine the secret logic locking key. The test-data mining attack and the hill climbing attack determine the secret key from the test data. The de-synthesis attack extracts the key by leveraging the traces left in a netlist during logic synthesis.

Details

ISBN :
978-3-030-15333-5
ISBNs :
9783030153335
Database :
OpenAIRE
Journal :
Analog Circuits and Signal Processing ISBN: 9783030153335
Accession number :
edsair.doi...........40dadbbbdcd18f7285154c90a3100235