Glitch Propagation through Flip-Flops Endangers Masking Schemes: Why Time Separation Is Required

dc.contributor.authorReefat, Hasin Ishraq
dc.contributor.authorEbrahimabadi, Mohammad
dc.contributor.authorTakarabt, Sofiane
dc.contributor.authorGuilley, Sylvain
dc.contributor.authorKarimi, Naghmeh
dc.date.accessioned2026-02-12T16:44:50Z
dc.date.issued2026-04
dc.descriptionDesign, Automation and Test in Europe Conference April 20-22, 2026, Verona, Italy
dc.description.abstractGlitches are hardware-level hazards that are capable of compromising secure implementations. Even dominant protections against side-channel attacks must demonstrate immunity in the potential presence of glitches. In this paper, we study two hardware masking schemes rationales, namely Ishai-ShaiWagner (ISW) and its Enhanced version (E-ISW), as well as Domain-Oriented Masking (DOM). While other glitch-aware masking schemes have been proposed, our focus is specifically on the differences between E-ISW and DOM. Those two styles rely respectively on combinational and on sequential separation of shares. It is known that sequential separation, realized through pipelining stages, does impact the latency of the hardware masking scheme. Additionally, in this paper, we show another drawback: pipelining does not provide full independence between manipulated shares. Indeed, we show that pipelining elements (DFFs in practice) can propagate upstream activity downstream. This results in first-order leakage in real-world systems, especially when parasitic effects are considered. In this respect, we show that DOM is leaking at first-order, and that this leakage increases with both the complexity of the netlist (in terms of number of DOM gadgets) and with the extent to which the operational environment can be worsened by an attacker (e.g., lowering the voltage to increase the leakage). These findings provide valuable insights for advancing secure hardware design.
dc.description.sponsorshipThis work was supported in part by the National Science Foundation CAREER Award (NSF CNS-1943224).
dc.format.extent7 pages
dc.genreconference papers and proceedings
dc.genrepreprints
dc.identifier.urihttp://hdl.handle.net/11603/41959
dc.language.isoen
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.subjectUMBC Cybersecurity Institute
dc.titleGlitch Propagation through Flip-Flops Endangers Masking Schemes: Why Time Separation Is Required
dc.typeText
dcterms.creatorhttps://orcid.org/0009-0000-6776-2542
dcterms.creatorhttps://orcid.org/0000-0001-6831-8339
dcterms.creatorhttps://orcid.org/0000-0002-5825-6637

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
26_DATE_DOM_attack.pdf
Size:
1.97 MB
Format:
Adobe Portable Document Format