Application-Specific Power Side-Channel Attacks and Countermeasures: A Survey
By: Sahan Sanjaya, Aruna Jayasena, Prabhat Mishra
Potential Business Impact:
Protects secrets by hiding how much power a device uses.
Side-channel attacks try to extract secret information from a system by analyzing different side-channel signatures, such as power consumption, electromagnetic emanation, thermal dissipation, acoustics, time, etc. Power-based side-channel attack is one of the most prominent side-channel attacks in cybersecurity, which rely on data-dependent power variations in a system to extract sensitive information. While there are related surveys, they primarily focus on power side-channel attacks on cryptographic implementations. In recent years, power-side channel attacks have been explored in diverse application domains, including key extraction from cryptographic implementations, reverse engineering of machine learning models, user behavior data exploitation, and instruction-level disassembly. In this paper, we provide a comprehensive survey of power side-channel attacks and their countermeasures in different application domains. Specifically, this survey aims to classify recent power side-channel attacks and provide a comprehensive comparison based on application-specific considerations.
Similar Papers
Modern Hardware Security: A Review of Attacks and Countermeasures
Cryptography and Security
Protects computers from secret spying and hacking.
Power Side-Channel Analysis of the CVA6 RISC-V Core at the RTL Level Using VeriSide
Cryptography and Security
Finds secret codes hidden in computer chips.
Backing the Wrong Horse: How Bit-Level Netlist Augmentation can Counter Power Side Channel Attacks
Cryptography and Security
Stops hackers from stealing secrets from computer chips.