12th september 2005 15:00 – 18:30 TIMA Laboratory,

Slides:



Advertisements
Similar presentations
Model-Based Testing with Smartesting Jean-Pierre Schoch Sogetis Second Testing Academy 29 April 2009.
Advertisements

Analysis of Computer Algorithms
Some activities on Biometrics at ENST/CNRS-LTCI
Institute of Applied Microelectronics and Computer Engineering College of Computer Science and Electrical Engineering, University of Rostock Spezielle.
Embedded Systems & Parallel Programming P. Marwedel, Univ. Dortmund/Informatik 12 + ICD/ES, 2007 Universität Dortmund A view on embedded systems.
© 2005 by Prentice Hall Chapter 13 Finalizing Design Specifications Modern Systems Analysis and Design Fourth Edition Jeffrey A. Hoffer Joey F. George.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 4 Computing Platforms.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 1 Embedded Computing.
System Development MIS Chapter 6 Jack G. Zheng July 18 th 2005.
An innovative concept to disseminate scientific communications
17 Copyright © 2005, Oracle. All rights reserved. Deploying Applications by Using Java Web Start.
MeDON meeting 09 mars IFREMER PROGRESS REPORT WP 3.5 dev & fabrication of the proof of concept architecture and description electronics and sofware.
CARE-INO ANIMS: Animation and Sound in ATC Human Machine Interfaces December 6, 2005 Célin e Schlienger In t uiLab, t uilab.com t uilab.com.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Making the System Operational
2010 fotografiert von Jürgen Roßberg © Fr 1 Sa 2 So 3 Mo 4 Di 5 Mi 6 Do 7 Fr 8 Sa 9 So 10 Mo 11 Di 12 Mi 13 Do 14 Fr 15 Sa 16 So 17 Mo 18 Di 19.
ECE 495: Integrated System Design I
Figure 12–1 Basic computer block diagram.
Presenter : Cheng-Ta Wu Kenichiro Anjo, Member, IEEE, Atsushi Okamura, and Masato Motomura IEEE JOURNAL OF SOLID-STATE CIRCUITS, VOL. 39,NO. 5, MAY 2004.
© 2010 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks of Invensys.
Randomized Algorithms Randomized Algorithms CS648 1.
ABC Technology Project
HORIZONT 1 XINFO ® The IT Information System HORIZONT Software for Datacenters Garmischer Str. 8 D München Tel ++49(0)89 /
Some Trends in High-level Synthesis Research Tools Tanguy Risset Compsys, Lip, ENS-Lyon
The “Little Man Computer” Version
1 1 Mechanical Design and Production Dept, Faculty of Engineering, Zagazig University, Egypt. Mechanical Design and Production Dept, Faculty of Engineering,
CS105 Introduction to Computer Concepts GATES and CIRCUITS
1 Undirected Breadth First Search F A BCG DE H 2 F A BCG DE H Queue: A get Undiscovered Fringe Finished Active 0 distance from A visit(A)
Mafijul Islam, PhD Software Systems, Electrical and Embedded Systems Advanced Technology & Research Research Issues in Computing Systems: An Automotive.
1 What is JavaScript? JavaScript was designed to add interactivity to HTML pages JavaScript is a scripting language A scripting language is a lightweight.
+ 4.5hrs = What Who Eind datum % af 13. Feb.14. Feb.15. Feb.16. Feb.17. Feb.18. Feb.19. Feb.20. Feb.21. Feb.22. Feb.23. Feb.24. Feb.25. Feb.26.
VOORBLAD.
©2007 First Wave Consulting, LLC A better way to do business. Period This is definitely NOT your father’s standard operating procedure.
1 Communication Unit Meeting of the OIE RR/SRR Paris, October 2010 Maria Zampaglione Head, OIE Communication Unit.
BIOLOGY AUGUST 2013 OPENING ASSIGNMENTS. AUGUST 7, 2013  Question goes here!
© 2012 National Heart Foundation of Australia. Slide 2.
Implementation Architecture
CRT RSA Algorithm Protected Against Fault Attacks WISTP - 5/10/07 Arnaud BOSCHER Spansion EMEA Robert NACIRI Oberthur Card Systems Emmanuel PROUFF Oberthur.
S 1 Intelligent MultiModal Interfaces Manuel J. Fonseca Joaquim A. Jorge
25 seconds left…...
Januar MDMDFSSMDMDFSSS
We will resume in: 25 Minutes.
 Centre National de la Recherche Scientifique  Institut National Polytechnique de Grenoble  Université Joseph Fourier Laboratoire G-SCOP 46, av Félix.
Anne-Laure Ladier*, Gülgün Alpan*, Allen G. Greenwood ● *G-SCOP, Grenoble INP, France ● Department of Industrial Engineering, Mississippi State University.
Mani Srivastava UCLA - EE Department Room: 6731-H Boelter Hall Tel: WWW: Copyright 2003.
Mani Srivastava UCLA - EE Department Room: 6731-H Boelter Hall Tel: WWW: Copyright 2003.
Presenter MaxAcademy Lecture Series – V1.0, September 2011 Dataflow Programming with MaxCompiler.
Extensible Processors. 2 ASIP Gain performance by:  Specialized hardware for the whole application (ASIC). −  Almost no flexibility. −High cost.  Use.
Feng-Xiang Huang A Low-Cost SOC Debug Platform Based on On-Chip Test Architectures.
Modeling a NAND Flash Memory Storage Subsystem Toward a Unified Performance and Power Consumption NAND Flash Memory Model of Embedded and Solid State Secondary.
(1) Introduction © Sudhakar Yalamanchili, Georgia Institute of Technology, 2006.
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
 Centre National de la Recherche Scientifique  Institut National Polytechnique de Grenoble  Université Joseph Fourier Laboratoire G-SCOP 46, av Félix.
Using Mathematica for modeling, simulation and property checking of hardware systems Ghiath AL SAMMANE VDS group : Verification & Modeling of Digital systems.
Fault Tolerant Infective Countermeasure for AES
Presenter: Hong-Wei Zhuang On-Chip SOC Test Platform Design Based on IEEE 1500 Standard Very Large Scale Integration (VLSI) Systems, IEEE Transactions.
Advanced SW/HW Optimization Techniques for Application Specific MCSoC m Yumiko Kimezawa Supervised by Prof. Ben Abderazek Graduate School of Computer.
Institut für Computertechnik ICT Institute of Computer Technology Remote Control and Reconfiguration of Laboratories for Education and Training Vienna.
IEEE ICECS 2010 SysPy: Using Python for processor-centric SoC design Evangelos Logaras Elias S. Manolakos {evlog, Department of Informatics.
F. Gharsalli, S. Meftali, F. Rousseau, A.A. Jerraya TIMA laboratory 46 avenue Felix Viallet Grenoble Cedex - France Embedded Memory Wrapper Generation.
Testability of Analogue Macrocells Embedded in System-on-Chip Workshop on the Testing of High Resolution Mixed Signal Interfaces Held in conjunction with.
Kouichi Itoh, Tetsuya Izu and Masahiko Takenaka Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) August, 2002 Address-bit Differential.
DAC50, Designer Track, 156-VB543 Parallel Design Methodology for Video Codec LSI with High-level Synthesis and FPGA-based Platform Kazuya YOKOHARI, Koyo.
Programmable Logic Devices
Design and Documentation
Presentation transcript:

ACI “Sécurité Informatique” MARS Matériel Robuste pour Systèmes Sûrs – Project Meeting – 12th september 2005 15:00 – 18:30 TIMA Laboratory, 46 Avenue Felix Viallet, 38031 Grenoble Cedex. Sylvain GUILLEY, <sylvain.guilley@enst.fr> Page 1

Outline General information Project status Débriefing IOLTS (July 6-8, 2005), CHES (Aug 29-Sept 1st, 2005), FDTC (Sept 2, 2005), ESSCIRC (Sept 13-16, 2005) Power analysis at various abstraction levels RSA modules Prototype ASIC: towards specifications Page 2

General information PaRISTIC : Panorama des Recherches Incitatives en STIC 21, 22, 23 Novembre 2005 at LaBRI, Bordeaux Gathers feedback from « Masse de Données », « Sécurité et Informatique », « Grid’5000 » and « IMPBio » projects http://paristic.labri.fr/ MARS project first anniversary A document that summarizes the current results is to be written Project website updated with published papers http://www.comelec.enst.fr/recherche/mars/realizations.php Page 3

Project status On-going tasks: Started tasks: Preliminary comparative study of SCA and FA counter-measures Development of CAD tools/libraries FPGA-based cross-evaluation of existing counter-measures Definition of new counter-measures targeting both SCA and FA Started tasks: Publication and diffusion of the results Page 4

Debriefing of past conferences IOLTS IEEE International On-Line Testing Symposium CHES Cryptographic Hardware and Embbeded Systems FDTC Workshop on Fault Diagnosis and Tolerance in Cryptography ESSCIRC European Solid-State CIRCuit Conference Page 5

Power analysis at various abstraction levels A general dissipation model: both power and EMI Accurate enough to model DPA: it is a second order attack! Validated in silico: simple design to set up (e.g. a register bank + an SBox) electrical model of: the (active) probing system, the acquisition equipment A priori, no need to know anything about: the bounding, the pads A methodology to abstract the measurements: continuity from measurements to simulations, on netlists or on behavioral (abstract) hardware description Page 6

RSA modules Candidate, along with DES, to be embedded in the prototype ASIC (see next slide) SCA-proof: Timing attack impossible because the execution is in constant time (MMM virtue) Ad hoc (e.g. Montgomery ladder exponentiation) counter-measure against SPA Masking against DPA Fault resistant: Error detection in registers and/or Proof by 2m-1 Open issues: Is masking really efficient against DPA? What about malevolently induced glitches? Two architectures (ENST & TIMA), with the same capabilities and the same interface, in the same ASIC. Page 7

Prototype ASIC: towards specifications « SECMAT V1.0 » is up-and-running The SoC architecture is flexible: « plug & play » modules addition standardized interface (A-VCI) wrappers already written and validated for block-processing modules What is a typical module? Has an embedded RAM START / EOC simple control (more elaborate commands can be devised) Signals the EOC by an interrupt Hardware constraints RAM size: a few kbytes is OK Logic: 0.25 mm2 in HCMOS9GP is probably the max affordable Special requirements for testing / dependability evaluation? Page 8