Skip to main content

Security Implications of Crosstalk in Switching CMOS Gates

  • Conference paper
Information Security (ISC 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6531))

Included in the following conference series:

Abstract

The energy dissipation associated with switching in CMOS logic gates can be used to classify the microprocessors activity. It is relatively easy to classify activity by the number of transitions, i.e. Hamming Distance (HD). In this paper we consider layout dependent phenomena, such as capacitive crosstalk to derive a more precise power model. We show that for an 8 bit data bus, crosstalk may improve detection performance from 2.5 bits (HD based detector) to theoretical 5.7 bits and simulated 5.0 bits (crosstalk based detector) of information pr sample. Thus we have shown that a layout specific phenomenon (capacitance) must be considered when analyzing security implications of power and electromagnetic side channels. A small case study has also been carried out that support our simulations/theoretical results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using ic fingerprinting. In: IEEE Symposium on Security and Privacy, pp. 296–310 (2007)

    Google Scholar 

  2. Chari, S., Rao, J.R., Rohatgi, P.: ”template attack”. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13–28. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Chen, Z., Haider, S., Schaumont, P.: Side-channel leakage in masked circuits caused by higher-order circuit effects. In: Park, J.H., Chen, H.-H., Atiquzzaman, M., Lee, C., Kim, T.-h., Yeo, S.-S. (eds.) ISA 2009. LNCS, vol. 5576, pp. 327–336. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  4. Duan, C., Calle, V.H.C., Khatri, S.P.: Efficient on-chip crosstalk avoidance codec design. IEEE Transaction on Very Large Scale Integration (VLSI) Systems 17(4) (April 2009)

    Google Scholar 

  5. Dyrkolbotn, G.O., Snekkenes, E.: Modified template attack: Detecting address bus signals of equal hamming weight. In: Norsk informasjonssikkerhetskonferanse, NISK 2009 (2009)

    Google Scholar 

  6. Dyrkolbotn, G.O., Snekkenes, E.: A wireless covert channel on smart cards (short paper). In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 249–259. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999), http://www.cryptography.com/dpa/technical/index.html

    Chapter  Google Scholar 

  8. Mangard, S., Oswald, E., Popp, T.: Power Analysis Attack - Revealing the Secret of Smart Cards. Springer, Heidelberg (2007)

    MATH  Google Scholar 

  9. Moll, F., Roca, M., Isern, E.: Analysis of dissipation energy of switching digital cmos gates with coupled outputs. Microelectronics (34), 833–842 (2003)

    Google Scholar 

  10. Quisquater, J.-J., Samyde, D.: Automatic code recognition for smart cards using a kohonen neural network. In: 5th Smart Card Research and Advanced Application Conference, USENIX (2002)

    Google Scholar 

  11. Sotiriadis, P.P., Chandrakasan, A.: Low power bus coding techniques considering inter-wire capacitances. In: Proceedings of the IEEE Custom Integrated Curcuits Conference, pp. 507–510 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dyrkolbotn, G.O., Wold, K., Snekkenes, E. (2011). Security Implications of Crosstalk in Switching CMOS Gates. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds) Information Security. ISC 2010. Lecture Notes in Computer Science, vol 6531. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18178-8_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-18178-8_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-18177-1

  • Online ISBN: 978-3-642-18178-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics