GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MDPI AG  (2)
Material
Publisher
  • MDPI AG  (2)
Language
Years
  • 1
    Online Resource
    Online Resource
    MDPI AG ; 2021
    In:  Journal of Low Power Electronics and Applications Vol. 11, No. 4 ( 2021-11-12), p. 43-
    In: Journal of Low Power Electronics and Applications, MDPI AG, Vol. 11, No. 4 ( 2021-11-12), p. 43-
    Abstract: The elliptic curve cryptosystem (ECC) has been proven to be vulnerable to non-invasive side-channel analysis attacks, such as timing, power, visible light, electromagnetic emanation, and acoustic analysis attacks. In ECC, the scalar multiplication component is considered to be highly susceptible to side-channel attacks (SCAs) because it consumes the most power and leaks the most information. In this work, we design a robust asynchronous circuit for scalar multiplication that is resistant to state-of-the-art timing, power, and fault analysis attacks. We leverage the genetic algorithm with multi-objective fitness function to generate a standard Boolean logic-based combinational circuit for scalar multiplication. We transform this circuit into a multi-threshold dual-spacer dual-rail delay-insensitive logic (MTD3L) circuit. We then design point-addition and point-doubling circuits using the same procedure. Finally, we integrate these components together into a complete secure and dependable ECC processor. We design and validate the ECC processor using Xilinx ISE 14.7 and implement it in a Xilinx Kintex-7 field-programmable gate array (FPGA).
    Type of Medium: Online Resource
    ISSN: 2079-9268
    Language: English
    Publisher: MDPI AG
    Publication Date: 2021
    detail.hit.zdb_id: 2662567-2
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    MDPI AG ; 2021
    In:  Applied Sciences Vol. 11, No. 5 ( 2021-03-08), p. 2385-
    In: Applied Sciences, MDPI AG, Vol. 11, No. 5 ( 2021-03-08), p. 2385-
    Abstract: In this paper, we introduce a memory and cache contention denial-of-service attack and its hardware-based countermeasure. Our attack can significantly degrade the performance of the benign programs by hindering the shared resource accesses of the benign programs. It can be achieved by a simple C-based malicious code while degrading the performance of the benign programs by 47.6% on average. As another side-effect, our attack also leads to greater energy consumption of the system by 2.1× on average, which may cause shorter battery life in the mobile edge devices. We also propose detection and mitigation techniques for thwarting our attack. By analyzing L1 data cache miss request patterns, we effectively detect the malicious program for the memory and cache contention denial-of-service attack. For mitigation, we propose using instruction fetch width throttling techniques to restrict the malicious accesses to the shared resources. When employing our malicious program detection with the instruction fetch width throttling technique, we recover the system performance and energy by 92.4% and 94.7%, respectively, which means that the adverse impacts from the malicious programs are almost removed.
    Type of Medium: Online Resource
    ISSN: 2076-3417
    Language: English
    Publisher: MDPI AG
    Publication Date: 2021
    detail.hit.zdb_id: 2704225-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...