Chipwhisperer: An open-source platform for hardware embedded security research

C O'flynn, Z Chen - Constructive Side-Channel Analysis and Secure …, 2014 - Springer
This paper introduces a complete side channel analysis toolbox, inclusive of the analog
capture hardware, target device, capture software, and analysis software. The highly …

DPA, bitslicing and masking at 1 GHz

J Balasch, B Gierlichs, O Reparaz… - … and Embedded Systems …, 2015 - Springer
We present DPA attacks on an ARM Cortex-A8 processor running at 1 GHz. This high-end
processor is typically found in portable devices such as phones and tablets. In our case, the …

Lightweight side-channel protection using dynamic clock randomization

B Hettwer, K Das, S Leger, S Gehrer… - … Conference on Field …, 2020 - ieeexplore.ieee.org
Power analysis attacks have evolved rapidly over the past two decades, recently
strengthened by advanced deep learning algorithms. However, the application of effective …

Phase Modulation Side Channels: Jittery JTAG for On-Chip Voltage Measurements

C O'Flynn - IACR Transactions on Cryptographic Hardware and …, 2024 - icscm.ub.rub.de
Measuring fluctuations of the clock phase was identified as a source of leakage in early
electromagnetic side-channel investigations. Despite this, only recently was measuring the …

Synchronous sampling and clock recovery of internal oscillators for side channel analysis and fault injection

C O'Flynn, Z Chen - Journal of Cryptographic Engineering, 2015 - Springer
Measuring power consumption for side channel analysis typically uses an oscilloscope,
which measures the data relative to an internal sample clock. By synchronizing the sampling …

Power analysis attacks against IEEE 802.15. 4 nodes

C O'Flynn, Z Chen - Constructive Side-Channel Analysis and Secure …, 2016 - Springer
Abstract IEEE 802.15. 4 is a wireless standard used by a variety of higher-level protocols,
including many used in the Internet of Things (IoT). A number of system on a chip (SoC) …

Securing cryptographic circuits by exploiting implementation diversity and partial reconfiguration on FPGAs

B Hettwer, J Petersen, S Gehrer… - … , Automation & Test …, 2019 - ieeexplore.ieee.org
Adaptive and reconfigurable systems such as Field Programmable Gate Arrays (FPGAs)
play an integral part of many complex embedded platforms. This implies the capability to …

Moving target and implementation diversity based countermeasures against side-channel attacks

N Khan, B Hettwer, J Becker - International Symposium on Applied …, 2021 - Springer
Side-channel attacks (SCAs) are among the major threats to embedded systems' security,
where implementation characteristics of cryptographic algorithms are exploited to extract …

Deep learning multi-channel fusion attack against side-channel protected hardware

B Hettwer, D Fennes, S Leger… - 2020 57th ACM/IEEE …, 2020 - ieeexplore.ieee.org
State-of-the-art hardware masking approaches like threshold implementations and domain-
oriented masking provide a guaranteed level of security even in the presence of glitches …

Measurement and analysis of electromagnetic information leakage from printed circuit board power delivery network of cryptographic devices

S Wada, Y Hayashi, D Fujimoto… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This article presents a novel measurement and analysis of electromagnetic (EM) information
leakage from printed circuit board (PCB) power delivery network (PDN) of cryptographic …