Using the MSET Device to Counteract Power-Analysis Attacks

1Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

One pivotal countermeasure in dealing with side-channel power analysis attacks is to maintain the signal-to-noise ratio of the power readings associated with the target as data-independent and as low as possible, in order to limit the attacker's ability to deduce meaningful information from the target. The following study shows that the MSET (Multiple-State Electrostatically-Formed Nanowire Transistor) device achieves these two desired outcomes by virtue of its low-power characteristics, therefore having an inherent advantage in terms of side channel attacks over prevalent technologies. This advantage is tested with an SRAM cell and a memory register. Using correlation metrics, the correlation coefficient of the Hamming distance to the power dissipation in the register - at the adversary's point of observation - is shown to be close to zero over multiple power traces, when the register is implemented in MSET technology.

Cite

CITATION STYLE

APA

Peled, A., David, L., Amrani, O., Rosenwaks, Y., & Wool, A. (2020). Using the MSET Device to Counteract Power-Analysis Attacks. IEEE Journal of the Electron Devices Society, 8, 1328–1334. https://doi.org/10.1109/JEDS.2020.3032635

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free