Short Paper – Power-hammering through Glitch Amplification – Attacks and Mitigat

FCCM Main Page Forums Paper Session 2 – Networks and Security Short Paper – Power-hammering through Glitch Amplification – Attacks and Mitigat

Viewing 2 reply threads
  • Author
    Posts
    • #1156
      Ken Eguro
      Keymaster

      Short Paper – Power-hammering through Glitch Amplification – Attacks and MitigationLink for PDF
      Kaspar Matas (The University of Manchester), Tuan Minh La (The University of Manchester), Khoa Dang Pham (The University of Manchester), and Dirk Koch (The University of Manchester)

    • #1633
      alex.forencich
      Participant

      Quick question: what if the ring oscillator or glitch amplifier is built from SRL primitives or distributed RAM which is configured at run-time, instead of LUTs?

    • #1653
      tuanla
      Participant

      Hi,

      Thank you for that geeky question.

      SRL and Distributed RAM are operated as synchronous write and asynchronous read.
      Therefore, similar with normal LUT operation, it is possible to create glitches in read mode since no clock edge is required to sync the output data.
      In that case, if we detect LUTs are in alternative modes (SRL or Distributed RAM) then we will give them the worst case glitch score (LUT as a wide XOR).

      Best wishes,
      Tuan La

Viewing 2 reply threads
  • You must be logged in to reply to this topic.