TIGER: TrIaGing KEy Refreshing Frequency via Digital Sensors
| dc.contributor.author | Anik, Toufiq Hasan | |
| dc.contributor.author | Reefat, Hasin | |
| dc.contributor.author | Ebrahimabadi, Mohammad | |
| dc.contributor.author | Bahrami, Javad | |
| dc.contributor.author | Pourmehrani, Hossein | |
| dc.contributor.author | Danger, Jean-Luc | |
| dc.contributor.author | Guilley, Sylvain | |
| dc.contributor.author | Karimi, Naghmeh | |
| dc.date.accessioned | 2025-10-03T19:33:56Z | |
| dc.date.issued | 2025 | |
| dc.description | 22nd International Conference on Security and Cryptography,June 11-13, 2025, in Bilbao, Spain | |
| dc.description.abstract | Key refreshing is a pragmatic countermeasure to side-channel attacks, designed to revoke and replace the key promptly when an attack is either anticipated or suspected. This system-level approach rekeys the device under attack and keeps paired devices protected if cryptography secures data in transit. The frequency of key refreshing is critical: too infrequent, and security risks increase; too frequent, and system performance degrades. This frequency is set pre-silicon via threat analysis but may be inefficient as leakage varies with operating conditions. To fill the gap, we introduce a post-silicon strategy for optimal rekeying frequency. Our proposed scheme TIGER deploys a digital sensor to monitor environmental conditions and enabling inference at runtime by pre-characterizing the leakage rate correlated to the digital sensor measurements. The accumulated leakage rate helps deduce a cutoff time for rekeying. We demonstrate the end-to-end feasibility of this approach on an FPGA board designed for side-channel threat assessment. | |
| dc.description.sponsorship | This work was supported in part by the National Science Foundation CAREER Award (NSF CNS 1943224). | |
| dc.description.uri | https://www.scitepress.org/PublicationsDetail.aspx?ID=qACcND7uY+I=&t=1 | |
| dc.format.extent | 10 pages | |
| dc.genre | conference papers and proceedings | |
| dc.genre | preprints | |
| dc.identifier | doi:10.13016/m2jorr-yg8y | |
| dc.identifier.citation | Anik, Md, Hasin Reefat, Mohammad Ebrahimabadi, et al. “TIGER: TrIaGing KEy Refreshing Frequency via Digital Sensors:” Proceedings of the 22nd International Conference on Security and Cryptography, SCITEPRESS - Science and Technology Publications, 2025, 372–80. https://doi.org/10.5220/0013515200003979. | |
| dc.identifier.uri | https://doi.org/10.5220/0013515200003979 | |
| dc.identifier.uri | http://hdl.handle.net/11603/40370 | |
| dc.language.iso | en | |
| dc.publisher | SciTePress | |
| dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
| dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department | |
| dc.relation.ispartof | UMBC Student Collection | |
| dc.relation.ispartof | UMBC Faculty Collection | |
| dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | |
| dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/deed.en | |
| dc.subject | UMBC Cybersecurity Institute | |
| dc.title | TIGER: TrIaGing KEy Refreshing Frequency via Digital Sensors | |
| dc.type | Text | |
| dcterms.creator | https://orcid.org/0000-0001-6831-8339 | |
| dcterms.creator | https://orcid.org/0009-0001-3906-6117 | |
| dcterms.creator | https://orcid.org/0000-0002-5825-6637 | |
| dcterms.creator | https://orcid.org/0000-0001-9302-413X | |
| dcterms.creator | https://orcid.org/0009-0000-6776-2542 |
Files
Original bundle
1 - 1 of 1
