Abstract
One pivotal countermeasure in dealing with side-channel power analysis attacks is to maintain the signal-to-noise ratio of the power readings associated with the target as data-independent and as low as possible, in order to limit the attacker's ability to deduce meaningful information from the target. The following study shows that the MSET (Multiple-State Electrostatically-Formed Nanowire Transistor) device achieves these two desired outcomes by virtue of its low-power characteristics, therefore having an inherent advantage in terms of side channel attacks over prevalent technologies. This advantage is tested with an SRAM cell and a memory register. Using correlation metrics, the correlation coefficient of the Hamming distance to the power dissipation in the register - at the adversary's point of observation - is shown to be close to zero over multiple power traces, when the register is implemented in MSET technology.
Author supplied keywords
Cite
CITATION STYLE
Peled, A., David, L., Amrani, O., Rosenwaks, Y., & Wool, A. (2020). Using the MSET Device to Counteract Power-Analysis Attacks. IEEE Journal of the Electron Devices Society, 8, 1328–1334. https://doi.org/10.1109/JEDS.2020.3032635
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.