On the vulnerability of FPGA bitstream encryption against power analysis attacks: Extracting keys from Xilinx Virtex-II FPGAs

A Moradi, A Barenghi, T Kasper, C Paar - … of the 18th ACM conference on …, 2011 - dl.acm.org
Over the last two decades FPGAs have become central components for many advanced
digital systems, eg, video signal processing, network routers, data acquisition and military …

Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II: facilitating black-box analysis using software reverse-engineering

A Moradi, D Oswald, C Paar… - Proceedings of the ACM …, 2013 - dl.acm.org
In order to protect FPGA designs against IP theft and related issues such as product cloning,
all major FPGA manufacturers offer a mechanism to encrypt the bitstream used to configure …

Optimization of power analysis using neural network

Z Martinasek, J Hajny, L Malina - … 2013, Berlin, Germany, November 27-29 …, 2014 - Springer
In power analysis, many different statistical methods and power consumption models are
used to obtain the value of a secret key from the power traces measured. An interesting …

A code morphing methodology to automate power analysis countermeasures

G Agosta, A Barenghi, G Pelosi - Proceedings of the 49th Annual Design …, 2012 - dl.acm.org
We introduce a general framework to automate the application of countermeasures against
Differential Power Attacks aimed at software implementations of cryptographic primitives …

Physical security evaluation of the bitstream encryption mechanism of Altera Stratix II and Stratix III FPGAs

P Swierczynski, A Moradi, D Oswald… - ACM Transactions on …, 2014 - dl.acm.org
To protect Field-Programmable Gate Array (FPGA) designs against Intellectual Property (IP)
theft and related issues such as product cloning, all major FPGA manufacturers offer a …

Improving side-channel analysis with optimal linear transforms

D Oswald, C Paar - Smart Card Research and Advanced Applications …, 2013 - Springer
Pre-processing techniques are widely used to increase the success rate of side-channel
analysis when attacking (protected) implementations of cryptographic algorithms. However …

An energy trace compression method for differential power analysis attack

X Cai, R Li, S Kuang, J Tan - IEEE Access, 2020 - ieeexplore.ieee.org
Differential power analysis attacks are the most commonly used means to break
cryptographic devices within the side-channel attack technology. Since there is a lot of noise …

Differential electromagnetic attacks on a 32-bit microprocessor using software defined radios

DP Montminy, RO Baldwin, MA Temple… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Side-channel analysis has been used to successfully attack many cryptographic systems.
However, to improve trace quality and make collection of side-channel data easier, the …

Differential power analysis attack on ARM based AES implementation without explicit synchronization

M Petrvalsky, M Drutarovsky… - 2014 24th International …, 2014 - ieeexplore.ieee.org
This paper presents Differential Power Analysis (DPA) attack on 32-bit ARM Cortex-M3
microprocessor. Attacked algorithm is unprotected Advanced Encryption Standard (AES) …

Information leakage discovery techniques to enhance secure chip design

A Barenghi, G Pelosi, Y Teglia - … Security Theory and Practice. Security and …, 2011 - Springer
Side channel attacks analyzing both power consumption and electromagnetic (EM)
radiations are a well known threat to the security of devices dealing with sensitive data …