Analog IP to protect SoC from side-channel attacks
By Chris Morrison, Agile Analog
Planet Analog (August 16, 2023)
The frequency and severity of side-channel attacks (SCAs) have been accelerating for some time. Hackers are now looking beyond software and they are attempting to compromise chips, as these can yield valuable information and the hassle of navigating software security can be avoided.
Across the globe, there are growing concerns about SCAs. Which type of applications are susceptible to SCAs? How can SCAs be spotted? This article focuses on voltage-centric side-channel attacks and outlines key functions of an analog IP for a voltage glitch detection solution.
Voltage side-channel attacks are becoming a popular method used by hackers to target chips. This is when malicious individuals aim to gain direct access to electronics and use glitching techniques to weaken the system. The security breaches that occur because of a successful SCA can reveal a significant quantity of sensitive information and leave the system on chip (SoC) in an extremely vulnerable position.
![]() |
E-mail This Article | ![]() |
![]() |
Printer-Friendly Page |
|
Related Articles
- Defend encryption systems against side-channel attacks
- How control electronics can help scale quantum computers
- Agile Analog's Approach to Analog IP Design and Quality --- Why "Silicon Proven" is NOT What You Think
- Agile Verification for SoC Design
- How a voltage glitch attack could cripple your SoC or MCU - and how to securely protect it
New Articles
- Rising respins and need for re-evaluation of chip design strategies
- Simplifying analog and mixed-signal design integration
- AI-driven SRAM demand needs integrated repair and security
- Understanding the contenders for the Flash memory crown
- Select the Right Microcontroller IP for Your High-Integrity SoCs
Most Popular
- System Verilog Assertions Simplified
- System Verilog Macro: A Powerful Feature for Design Verification Projects
- Enhancing VLSI Design Efficiency: Tackling Congestion and Shorts with Practical Approaches and PnR Tool (ICC2)
- Design Rule Checks (DRC) - A Practical View for 28nm Technology
- UVM RAL Model: Usage and Application