TIGER: TrIaGing KEy Refreshing Frequency via Digital Sensors

dc.contributor.authorAnik, Toufiq Hasan
dc.contributor.authorReefat, Hasin
dc.contributor.authorEbrahimabadi, Mohammad
dc.contributor.authorBahrami, Javad
dc.contributor.authorPourmehrani, Hossein
dc.contributor.authorDanger, Jean-Luc
dc.contributor.authorGuilley, Sylvain
dc.contributor.authorKarimi, Naghmeh
dc.date.accessioned2025-10-03T19:33:56Z
dc.date.issued2025
dc.description22nd International Conference on Security and Cryptography,June 11-13, 2025, in Bilbao, Spain
dc.description.abstractKey refreshing is a pragmatic countermeasure to side-channel attacks, designed to revoke and replace the key promptly when an attack is either anticipated or suspected. This system-level approach rekeys the device under attack and keeps paired devices protected if cryptography secures data in transit. The frequency of key refreshing is critical: too infrequent, and security risks increase; too frequent, and system performance degrades. This frequency is set pre-silicon via threat analysis but may be inefficient as leakage varies with operating conditions. To fill the gap, we introduce a post-silicon strategy for optimal rekeying frequency. Our proposed scheme TIGER deploys a digital sensor to monitor environmental conditions and enabling inference at runtime by pre-characterizing the leakage rate correlated to the digital sensor measurements. The accumulated leakage rate helps deduce a cutoff time for rekeying. We demonstrate the end-to-end feasibility of this approach on an FPGA board designed for side-channel threat assessment.
dc.description.sponsorshipThis work was supported in part by the National Science Foundation CAREER Award (NSF CNS 1943224).
dc.description.urihttps://www.scitepress.org/PublicationsDetail.aspx?ID=qACcND7uY+I=&t=1
dc.format.extent10 pages
dc.genreconference papers and proceedings
dc.genrepreprints
dc.identifierdoi:10.13016/m2jorr-yg8y
dc.identifier.citationAnik, Md, Hasin Reefat, Mohammad Ebrahimabadi, et al. “TIGER: TrIaGing KEy Refreshing Frequency via Digital Sensors:” Proceedings of the 22nd International Conference on Security and Cryptography, SCITEPRESS - Science and Technology Publications, 2025, 372–80. https://doi.org/10.5220/0013515200003979.
dc.identifier.urihttps://doi.org/10.5220/0013515200003979
dc.identifier.urihttp://hdl.handle.net/11603/40370
dc.language.isoen
dc.publisherSciTePress
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department
dc.relation.ispartofUMBC Student Collection
dc.relation.ispartofUMBC Faculty Collection
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/deed.en
dc.subjectUMBC Cybersecurity Institute
dc.titleTIGER: TrIaGing KEy Refreshing Frequency via Digital Sensors
dc.typeText
dcterms.creatorhttps://orcid.org/0000-0001-6831-8339
dcterms.creatorhttps://orcid.org/0009-0001-3906-6117
dcterms.creatorhttps://orcid.org/0000-0002-5825-6637
dcterms.creatorhttps://orcid.org/0000-0001-9302-413X
dcterms.creatorhttps://orcid.org/0009-0000-6776-2542

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Tiger(2).pdf
Size:
1.98 MB
Format:
Adobe Portable Document Format