The EAI INISCOM 2021 conference aims to address, explore, and exchange information on the state-of-the-art in all types of Computing, Telecommunications technologies, and applications of Internet of things (IoT) to improve citizens’ lives.
The 7th edition of EAI INISCOM will take place in Hanoi Vietnam on April 22-23, 2021.
Following the selection of its papers, Secure-IC will give two talks:
- On April 22 at 16:15 (GMT+7 – CET 09:15 AM) on “Post-Layout Security Evaluation Methodology against Probing Attacks”
Probing attack is considered to be one of the most powerful attack used to break the security and extract confidential information from an embedded system. This attack requires different bespoke equipment’s and expertise. However, for the moment, there is no methodology to evaluate theoretically the security level of a design or circuit againstthis threat. It can be only realized by a real evaluation of a certified evaluation laboratory. For the design house, this evaluation can be expensive in terms of time and money. In this paper, we introduce an innovative methodology that can be applied to evaluate the probing attack on any design at simulation level. Our method helps to extract the sensitive signals of a design, emulate different Focused Ions Beam technologies used for probing attacks, and evaluate the accessibility level of each signal. It can be used to evaluate precisely any probing attack on the target design at simulation level, hence reducing the cost and time to mar-ket of the design. This methodology can be applied for both ASIC and FPGA technology. A use-case on an AES-128 shows the efficiency of our methodology. It also helps to evaluate the efficiency of the active shield used as a countermeasure against probing attack.
- On April 23 at 09:25 (GMT+7 – CET 02:25 AM) on “Highly Reliable PUFs for Embedded Systems, Protected against Tampering”
Physically Unclonable Functions (PUFs) are well-known to be solutions for anti-copy applications. However, as they are sensitive components, they are the obvious target of attacks. Thus, they shall be well protected. In this work we discuss the use case of key generation with a Loop PUF. We discuss the Loop PUF’s efficiency and efficacy. We analyze it with respect to several known attacks like side-channel and machine learning attacks, and show that in all considered cases it either natively resists or can be protected. We also show that perturbation attempts should be within the scope of likely attacks, hence the PUF shall be protected against tampering attacks as well. Also for this attack scenario we highlight the salient features of the Loop PUF and explain how its mode of operation natively empowers it to resist such attacks.