loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Md Toufiq Hasan Anik 1 ; Hasin Ishraq Reefat 1 ; Mohammad Ebrahimabadi 1 ; Javad Bahrami 1 ; Hossein Pourmehrani 1 ; Jean-Luc Danger 2 ; 3 ; Sylvain Guilley 3 ; 2 and Naghmeh Karimi 1

Affiliations: 1 CSEE Department, University of Maryland Baltimore County, Baltimore, U.S.A. ; 2 Secure-IC S.A.S., Technology & Strategy Division, Paris, France ; 3 LTCI, Télécom Paris, Institut Polytechnique de Paris, Palaiseau, France

Keyword(s): Side-Channel Analysis, Attack Detection, Device Rekeying, Leakage Rate Characterization, Digital Sensor for Information Leakage Estimation, Minimization of the Key Refresh Frequency, TIGER Methodology.

Abstract: Key refreshing is a pragmatic countermeasure to side-channel attacks, designed to revoke and replace the key promptly when an attack is either anticipated or suspected. This system-level approach rekeys the device under attack and keeps paired devices protected if cryptography secures data in transit. The frequency of key refreshing is critical: too infrequent, and security risks increase; too frequent, and system performance degrades. This frequency is set pre-silicon via threat analysis but may be inefficient as leakage varies with operating conditions. To fill the gap, we introduce a post-silicon strategy for optimal rekeying frequency. Our proposed scheme TIGER deploys a digital sensor to monitor environmental conditions and enabling inference at runtime by pre-characterizing the leakage rate correlated to the digital sensor measurements. The accumulated leakage rate helps deduce a cutoff time for rekeying. We demonstrate the end-to-end feasibility of this approach on an FPGA boa rd designed for side-channel threat assessment. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 216.73.216.40

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Anik, M. T. H., Reefat, H. I., Ebrahimabadi, M., Bahrami, J., Pourmehrani, H., Danger, J.-L., Guilley, S. and Karimi, N. (2025). TIGER: TrIaGing KEy Refreshing Frequency via Digital Sensors. In Proceedings of the 22nd International Conference on Security and Cryptography - SECRYPT; ISBN 978-989-758-760-3; ISSN 2184-7711, SciTePress, pages 372-380. DOI: 10.5220/0013515200003979

@conference{secrypt25,
author={Md Toufiq Hasan Anik and Hasin Ishraq Reefat and Mohammad Ebrahimabadi and Javad Bahrami and Hossein Pourmehrani and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi},
title={TIGER: TrIaGing KEy Refreshing Frequency via Digital Sensors},
booktitle={Proceedings of the 22nd International Conference on Security and Cryptography - SECRYPT},
year={2025},
pages={372-380},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0013515200003979},
isbn={978-989-758-760-3},
issn={2184-7711},
}

TY - CONF

JO - Proceedings of the 22nd International Conference on Security and Cryptography - SECRYPT
TI - TIGER: TrIaGing KEy Refreshing Frequency via Digital Sensors
SN - 978-989-758-760-3
IS - 2184-7711
AU - Anik, M.
AU - Reefat, H.
AU - Ebrahimabadi, M.
AU - Bahrami, J.
AU - Pourmehrani, H.
AU - Danger, J.
AU - Guilley, S.
AU - Karimi, N.
PY - 2025
SP - 372
EP - 380
DO - 10.5220/0013515200003979
PB - SciTePress