Matches in SemOpenAlex for { <https://semopenalex.org/work/W2997725831> ?p ?o ?g. }
- W2997725831 abstract "Power-based side channel attacks are effective in revealing the secret keys of cryptographic algorithm implementations running on soft processor systems. This paper, for the first time, proposes a clock random execution methodology (referred to as SCRIP) to execute a soft processor core and most of the components (some components cannot be executed with a random clock frequency). An open source soft processor system (LowRISC which is based on the RISC-V Instruction Set Architecture) has been executed with the proposed SCRIP clock random execution methodology. Power analysis attacks (including preprocessing techniques to remove the effects of random execution) were carried out against the SCRIP LowRISC soft processor implementation to test the effects of random clock execution. SCRIP LowRISC implementation is shown to be secure for up to 300,000 encryptions, while the LowRISC implementation without SCRIP revealed the secret key within 1,000 encryptions. The result of information leakage test shows that the secret key cannot be recovered with 99.999% confidence level. Compared to other soft core processor countermeasures, SCRIP LowRISC implementation has the smallest complete soft processor system with 1.04× resource overhead (the smallest hardware masking countermeasure, which is applied to only the ALU of a RISC-V processor has 1.59× resource overhead, and the smallest balancing countermeasure soft processor, with the countermeasure applied only to the ALU and the memory, required 1.15× area overhead) where the security against power analysis attacks is applied to most components of the processor (including ALU, caches, Block RAM, Block RAM controller, bus interconnect and SD card interface). SCRIP LowRISC implementation is the first soft processor with a random execution-based countermeasure to withstand preprocessing methods (such as power trace alignment and noise filtering) which remove the effects of random execution." @default.
- W2997725831 created "2020-01-10" @default.
- W2997725831 creator A5027719580 @default.
- W2997725831 creator A5030042327 @default.
- W2997725831 creator A5079126989 @default.
- W2997725831 date "2019-11-01" @default.
- W2997725831 modified "2023-09-25" @default.
- W2997725831 title "SCRIP: Secure Random Clock Execution on Soft Processor Systems to Mitigate Power-based Side Channel Attacks" @default.
- W2997725831 cites W1519539754 @default.
- W2997725831 cites W1543721789 @default.
- W2997725831 cites W1562542037 @default.
- W2997725831 cites W1580211761 @default.
- W2997725831 cites W1790072549 @default.
- W2997725831 cites W1972859418 @default.
- W2997725831 cites W1983487478 @default.
- W2997725831 cites W200116028 @default.
- W2997725831 cites W2037844954 @default.
- W2997725831 cites W2062989416 @default.
- W2997725831 cites W2078199274 @default.
- W2997725831 cites W2084934620 @default.
- W2997725831 cites W2117082663 @default.
- W2997725831 cites W2125025555 @default.
- W2997725831 cites W2133198962 @default.
- W2997725831 cites W2136347482 @default.
- W2997725831 cites W2154909745 @default.
- W2997725831 cites W2157855196 @default.
- W2997725831 cites W2406147923 @default.
- W2997725831 cites W2640092413 @default.
- W2997725831 cites W2807669647 @default.
- W2997725831 cites W3028629999 @default.
- W2997725831 cites W3031536579 @default.
- W2997725831 cites W3032243497 @default.
- W2997725831 cites W49529705 @default.
- W2997725831 cites W750791596 @default.
- W2997725831 doi "https://doi.org/10.1109/iccad45719.2019.8942112" @default.
- W2997725831 hasPublicationYear "2019" @default.
- W2997725831 type Work @default.
- W2997725831 sameAs 2997725831 @default.
- W2997725831 citedByCount "2" @default.
- W2997725831 countsByYear W29977258312021 @default.
- W2997725831 crossrefType "proceedings-article" @default.
- W2997725831 hasAuthorship W2997725831A5027719580 @default.
- W2997725831 hasAuthorship W2997725831A5030042327 @default.
- W2997725831 hasAuthorship W2997725831A5079126989 @default.
- W2997725831 hasConcept C111919701 @default.
- W2997725831 hasConcept C126298526 @default.
- W2997725831 hasConcept C149635348 @default.
- W2997725831 hasConcept C165005293 @default.
- W2997725831 hasConcept C173608175 @default.
- W2997725831 hasConcept C178489894 @default.
- W2997725831 hasConcept C178693496 @default.
- W2997725831 hasConcept C202491316 @default.
- W2997725831 hasConcept C2779960059 @default.
- W2997725831 hasConcept C28420585 @default.
- W2997725831 hasConcept C38652104 @default.
- W2997725831 hasConcept C41008148 @default.
- W2997725831 hasConcept C49289754 @default.
- W2997725831 hasConcept C76155785 @default.
- W2997725831 hasConcept C78766204 @default.
- W2997725831 hasConcept C9390403 @default.
- W2997725831 hasConceptScore W2997725831C111919701 @default.
- W2997725831 hasConceptScore W2997725831C126298526 @default.
- W2997725831 hasConceptScore W2997725831C149635348 @default.
- W2997725831 hasConceptScore W2997725831C165005293 @default.
- W2997725831 hasConceptScore W2997725831C173608175 @default.
- W2997725831 hasConceptScore W2997725831C178489894 @default.
- W2997725831 hasConceptScore W2997725831C178693496 @default.
- W2997725831 hasConceptScore W2997725831C202491316 @default.
- W2997725831 hasConceptScore W2997725831C2779960059 @default.
- W2997725831 hasConceptScore W2997725831C28420585 @default.
- W2997725831 hasConceptScore W2997725831C38652104 @default.
- W2997725831 hasConceptScore W2997725831C41008148 @default.
- W2997725831 hasConceptScore W2997725831C49289754 @default.
- W2997725831 hasConceptScore W2997725831C76155785 @default.
- W2997725831 hasConceptScore W2997725831C78766204 @default.
- W2997725831 hasConceptScore W2997725831C9390403 @default.
- W2997725831 hasLocation W29977258311 @default.
- W2997725831 hasOpenAccess W2997725831 @default.
- W2997725831 hasPrimaryLocation W29977258311 @default.
- W2997725831 hasRelatedWork W100205324 @default.
- W2997725831 hasRelatedWork W1488317276 @default.
- W2997725831 hasRelatedWork W1519969013 @default.
- W2997725831 hasRelatedWork W1521777246 @default.
- W2997725831 hasRelatedWork W2039161392 @default.
- W2997725831 hasRelatedWork W2041242068 @default.
- W2997725831 hasRelatedWork W2058653714 @default.
- W2997725831 hasRelatedWork W2139234219 @default.
- W2997725831 hasRelatedWork W2183670552 @default.
- W2997725831 hasRelatedWork W2259783508 @default.
- W2997725831 hasRelatedWork W2341088863 @default.
- W2997725831 hasRelatedWork W241598521 @default.
- W2997725831 hasRelatedWork W2529492782 @default.
- W2997725831 hasRelatedWork W2904062476 @default.
- W2997725831 hasRelatedWork W3009575833 @default.
- W2997725831 hasRelatedWork W3014782383 @default.
- W2997725831 hasRelatedWork W3091388819 @default.
- W2997725831 hasRelatedWork W3140642049 @default.
- W2997725831 hasRelatedWork W3158986289 @default.
- W2997725831 hasRelatedWork W2226146161 @default.
- W2997725831 isParatext "false" @default.