Power Side-Channel Attacks in Negative Capacitance Transistor (NCFET)

07/08/2020
by   Johann Knechtel, et al.
0

Side-channel attacks have empowered bypassing of cryptographic components in circuits. Power side-channel (PSC) attacks have received particular traction, owing to their non-invasiveness and proven effectiveness. Aside from prior art focused on conventional technologies, this is the first work to investigate the emerging Negative Capacitance Transistor (NCFET) technology in the context of PSC attacks. We implement a CAD flow for PSC evaluation at design-time. It leverages industry-standard design tools, while also employing the widely-accepted correlation power analysis (CPA) attack. Using standard-cell libraries based on the 7nm FinFET technology for NCFET and its counterpart CMOS setup, our evaluation reveals that NCFET-based circuits are more resilient to the classical CPA attack, due to the considerable effect of negative capacitance on the switching power. We also demonstrate that the thicker the ferroelectric layer, the higher the resiliency of the NCFET-based circuit, which opens new doors for optimization and trade-offs.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/11/2018

PUF-AES-PUF: a novel PUF architecture against non-invasive attacks

In this letter, a physical unclonable function (PUF)-advanced encryption...
research
07/18/2023

On Borrowed Time – Preventing Static Power Side-Channel Analysis

In recent years, static power side-channel analysis attacks have emerged...
research
11/15/2022

X-Volt: Joint Tuning of Driver Strengths and Supply Voltages Against Power Side-Channel Attacks

Power side-channel (PSC) attacks are well-known threats to sensitive har...
research
11/05/2018

TrojanZero: Switching Activity-Aware Design of Undetectable Hardware Trojans with Zero Power and Area Footprint

Conventional Hardware Trojan (HT) detection techniques are based on the ...
research
10/11/2021

From FPGAs to Obfuscated eASICs: Design and Security Trade-offs

Threats associated with the untrusted fabrication of integrated circuits...
research
01/08/2022

Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula

Due to the nature of applications such as critical infrastructure and th...
research
01/07/2022

Methods for Increasing the Resistance of Cryptographic Designs against Horizontal DPA Attacks

Side-channel analysis attacks, especially horizontal DPA and DEMA attack...

Please sign up or login with your details

Forgot password? Click here to reset