Phase II Amount
$5,641,043
Side channel analysis (SCA) and fault injection (FI) are a solid part of the relevant attack space for any chip that can be physically reached by an attacker. These hardware attacks allow key extraction from cryptographic implementations, and fault injection specifically allows complete takeover of devices. Current commercial chip design tools do not offer integrated analysis to verify resistance against these attacks at design time. The effect is that countermeasure design is a manual and error-prone process: multiple tape outs may be required, and even for experts it is nontrivial to pinpoint and mitigate sources of vulnerability. The tools we are creating allow an EDA designer without specific side channel and fault injection knowledge to create a design with countermeasures and validate them pre-tapeout. We enable secure design space exploration by allowing the designer to analyze the security and PPA impact of various countermeasures. This Phase 2 effort extends the results from the Phase 1 data that indicates the feasibility of this approach, with several challenges to still overcome. By bringing this type of analysis and countermeasure insertion into the design flow, security joins power, performance, and area in the ASIC design flow. The goal is to significantly bring down the cost of creating chips with side channel and fault attack resistance, by enabling non-expert designers to create a resistant chip without having to perform multiple tape-outs. At the maximum security setting, the chip will have 10x less leakage and 10x smaller fault probability than without this technology, and we target an iteration time of 24 hours. The result is a design process and commercializable tooling to enable a non-security-expert designer in creating a side channel and fault resistant design. The effect of this tooling is massive cost savings through reduced tape-outs, and significant increase in security.