About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Industrial Networks and Intelligent Systems. 7th EAI International Conference, INISCOM 2021, Hanoi, Vietnam, April 22-23, 2021, Proceedings

Research Article

Post-layout Security Evaluation Methodology Against Probing Attacks

Download(Requires a free EAI acccount)
4 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-77424-0_37,
        author={Sofiane Takarabt and Sylvain Guilley and Youssef Souissi and Laurent Sauvage and Yves Mathieu},
        title={Post-layout Security Evaluation Methodology Against Probing Attacks},
        proceedings={Industrial Networks and Intelligent Systems. 7th EAI International Conference, INISCOM 2021, Hanoi, Vietnam, April 22-23, 2021, Proceedings},
        proceedings_a={INISCOM},
        year={2021},
        month={5},
        keywords={Probing attack FIB AES Active shield Exposed area.},
        doi={10.1007/978-3-030-77424-0_37}
    }
    
  • Sofiane Takarabt
    Sylvain Guilley
    Youssef Souissi
    Laurent Sauvage
    Yves Mathieu
    Year: 2021
    Post-layout Security Evaluation Methodology Against Probing Attacks
    INISCOM
    Springer
    DOI: 10.1007/978-3-030-77424-0_37
Sofiane Takarabt1,*, Sylvain Guilley1, Youssef Souissi1, Laurent Sauvage2, Yves Mathieu2
  • 1: Secure-IC S.A.S.
  • 2: Télécom Paris, Institut Polytechnique de Paris
*Contact email: sofiane.takarabt@secure-ic.com

Abstract

Probing attack is considered to be one of the most powerful attack used to break the security and extract confidential information from an embedded system. This attack requires different bespoke equipment’s and expertise. However, for the moment, there is no methodology to evaluate theoretically the security level of a design or circuit against this threat. It can be only realized by a real evaluation of a certified evaluation laboratory. For the design house, this evaluation can be expensive in term of time and money. In this paper, we introduce an innovative methodology that can be applied to evaluate the probing attack on any design at simulation level. Our method helps to extract the sensitive signals of a design, emulate different Focused Ions Beam technologies used for probing attacks, and evaluate the accessibility level of each signal. It can be used to evaluate precisely any probing attack on the target design at simulation level, hence reducing the cost and time to market of the design. This methodology can be applied for both ASIC and FPGA technology. A use-case on an AES-128 shows the efficiency of our methodology. It also helps to evaluate the efficiency of the active shield used as a countermeasure against probing attack.

Keywords
Probing attack FIB AES Active shield Exposed area.
Published
2021-05-28
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-77424-0_37
Copyright © 2021–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL