Chrome Extension
WeChat Mini Program
Use on ChatGLM

TSCL: A Time–space Crossing Location for Side-Channel Leakage Detection

Computer Networks(2022)CCF BSCI 3区SCI 2区

Nanjing Agr Univ | Wuhan Univ | Guizhou Univ Finance & Econ

Cited 0|Views21
Abstract
Cryptographic algorithms on devices are vulnerable to the so-called side-channel attacks(SCAs). The security evaluation of the cryptographic circuits is necessary to provide earlier leakage detection before manufacture. However, the complexity of locating leakage points is high because of the long execution time and the large scale of the circuit. To overcome this limitation, we propose an efficient leakage location method named time–space crossing location(TSCL) to locate the leakage in the hardware design, which combines the dynamic and static analysis. Unlike the traditional detection methods, we analyze the design features and power consumption characteristics of implementation to construct the candidate set on dynamic detection while further verifying candidate leakage points in the static detection stage. The t-test is known as a dynamic detection method to decrease the time of formal verification based on label propagation. The design features decrease the complexity of dynamic detection while the results of power consumption analysis promote static detection. We confirm the efficiency of the proposed method on unprotected and masking implementation of AES. Moreover, TSCL can be regarded as a third-party tool in the existing EDA tools of hardware design.
More
Translated text
Key words
Side-channel attack,Leakage location,AES,Cryptographic circuit
求助PDF
上传PDF
Bibtex
AI Read Science
AI Summary
AI Summary is the key point extracted automatically understanding the full text of the paper, including the background, methods, results, conclusions, icons and other key content, so that you can get the outline of the paper at a glance.
Example
Background
Key content
Introduction
Methods
Results
Related work
Fund
Key content
  • Pretraining has recently greatly promoted the development of natural language processing (NLP)
  • We show that M6 outperforms the baselines in multimodal downstream tasks, and the large M6 with 10 parameters can reach a better performance
  • We propose a method called M6 that is able to process information of multiple modalities and perform both single-modal and cross-modal understanding and generation
  • The model is scaled to large model with 10 billion parameters with sophisticated deployment, and the 10 -parameter M6-large is the largest pretrained model in Chinese
  • Experimental results show that our proposed M6 outperforms the baseline in a number of downstream tasks concerning both single modality and multiple modalities We will continue the pretraining of extremely large models by increasing data to explore the limit of its performance
Upload PDF to Generate Summary
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Data Disclaimer
The page data are from open Internet sources, cooperative publishers and automatic analysis results through AI technology. We do not make any commitments and guarantees for the validity, accuracy, correctness, reliability, completeness and timeliness of the page data. If you have any questions, please contact us by email: report@aminer.cn
Chat Paper
GPU is busy, summary generation fails
Rerequest