-
Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks
Authors:
Thilo Krachenfels,
Tuba Kiyan,
Shahin Tajik,
Jean-Pierre Seifert
Abstract:
The security of modern electronic devices relies on secret keys stored on secure hardware modules as the root-of-trust (RoT). Extracting those keys would break the security of the entire system. As shown before, sophisticated side-channel analysis (SCA) attacks, using chip failure analysis (FA) techniques, can extract data from on-chip memory cells. However, since the chip's layout is unknown to t…
▽ More
The security of modern electronic devices relies on secret keys stored on secure hardware modules as the root-of-trust (RoT). Extracting those keys would break the security of the entire system. As shown before, sophisticated side-channel analysis (SCA) attacks, using chip failure analysis (FA) techniques, can extract data from on-chip memory cells. However, since the chip's layout is unknown to the adversary in practice, secret key localization and reverse engineering are onerous tasks. Consequently, hardware vendors commonly believe that the ever-growing physical complexity of the integrated circuit (IC) designs can be a natural barrier against potential adversaries. In this work, we present a novel approach that can extract the secret key without any knowledge of the IC's layout, and independent from the employed memory technology as key storage. We automate the -- traditionally very labor-intensive -- reverse engineering and data extraction process. To that end, we demonstrate that black-box measurements captured using laser-assisted SCA techniques from a training device with known key can be used to profile the device for a later key prediction on other victim devices with unknown keys. To showcase the potential of our approach, we target keys on three different hardware platforms, which are utilized as RoT in different products.
△ Less
Submitted 23 February, 2021;
originally announced February 2021.
-
On relation between unitary gauge and gauge given by $ξ$-limiting process
Authors:
T. Kiyan,
T. Maekawa,
M. Masuda,
H. Taira
Abstract:
It is shown that in general the gauge given by the limit of $ξ\to 0$ in $R_ξ$ gauge does not necessarily agree with the unitary gauge by examining the symmetry breaking of two steps from ${\rm SU(3) \otimes U(1)}_N$ to ${\rm SU(2) \otimes U(1)}_Y$ and then to ${\rm U(1)}_{em}$.
It is shown that in general the gauge given by the limit of $ξ\to 0$ in $R_ξ$ gauge does not necessarily agree with the unitary gauge by examining the symmetry breaking of two steps from ${\rm SU(3) \otimes U(1)}_N$ to ${\rm SU(2) \otimes U(1)}_Y$ and then to ${\rm U(1)}_{em}$.
△ Less
Submitted 5 November, 2002;
originally announced November 2002.
-
On Nature of Right-Handed Singlet in 331 Model and Anomalies before and after SSB
Authors:
T. Kiyan,
T. Maekawa,
M. Masuda,
H. Taira
Abstract:
The gauge invariant and anomaly-free 331 model is studied with $R_ξ$ gauges in order to see which of the right-handed singlet between the case (i), assigning the bosonic singlet to the counterpart of 3 and $\bar 3$ representations, and the case (ii), assigning fermionic siglet to the counterpart of the left-handed 3 representation and assigning the antifermionic singlet to that of the left-hande…
▽ More
The gauge invariant and anomaly-free 331 model is studied with $R_ξ$ gauges in order to see which of the right-handed singlet between the case (i), assigning the bosonic singlet to the counterpart of 3 and $\bar 3$ representations, and the case (ii), assigning fermionic siglet to the counterpart of the left-handed 3 representation and assigning the antifermionic singlet to that of the left-handed $\bar 3$ representaion, should be assigned in physics but not mathematics to the counterparts of the left-handed fundamental 3 representation and the left-handed complex conjugate $\bar 3$ representation. It is shown that through an effect on the Yukawa interaction of the transformation property of the singlet it depends on the choices of the case (i) or the case (ii) whether the anomaly coefficients even after the spontaneous symmetry breaking (SSB) vanish or not, and the coefficients vanish only in the case (ii) but do not in the case (i). Furthermore, it is pointed out that the BRS invariance after the SSB holds for the case (ii) and (i-b) of two possibilities in the choice for the mass eigenstates in the case (i) and thus the BRS invariance does not necessarily ensure renormalizability of the theory though the inverse of it holds.
△ Less
Submitted 21 June, 2002; v1 submitted 19 June, 2002;
originally announced June 2002.
-
Note on Triangle Anomalies and Assignment of Singlet in 331-like Model
Authors:
T. Kiyan,
T. Maekawa,
S. Yokoi
Abstract:
It is pointed out that in the $331-$like model which uses both fundamental and complex conjugate representations for an assignment of the representations to the left-handed quarks and the scalar representation to their corresponding right-handed counterparts, the nature of the scalar should be taken into account in order to make the fermion triangle anomalies in the theory anomaly-free, i.e. ren…
▽ More
It is pointed out that in the $331-$like model which uses both fundamental and complex conjugate representations for an assignment of the representations to the left-handed quarks and the scalar representation to their corresponding right-handed counterparts, the nature of the scalar should be taken into account in order to make the fermion triangle anomalies in the theory anomaly-free, i.e. renormalizable in a sense with no anomalies, even after the spontaneous symmetry breaking.
△ Less
Submitted 22 September, 2002; v1 submitted 3 June, 2002;
originally announced June 2002.