Investigation of Side Channel Leakage of FeRAM Using Discrete Wavelet Transform

Ferroelectric RAM (FeRAM) is a Non-Volatile Memory (NVM) which offers high endurance, fast speed, low power and high density. Thus, they are suitable to replace conventional memories such as Dynamic RAM (DRAM). However, FeRAM are vulnerable to side channel attack. An adversary can measure the current drawn by the memory during read and write operation and find corresponding data being written to it or being read from the memory. This is a major problem for FeRAM as it would compromise the security of data being transmitted over communication networks. This work, for the first time, investigates the vulnerability of FeRAMs with noise. We have used Discrete Wavelet Transform (DWT) to reduce measurement noise since it is widely used for reducing noise from different type of signals. SureShrink operation is performed for noise reduction of write and read current. The analysis of noise filtered write and read current reveals that, FeRAM write operation is vulnerable to side channel attack whereas its read operation is resilient to such attacks since the data signature in the read current is minimal and vanishes due to measurement/environment noise.

[1]  Muhammad Faisal Amjad,et al.  Combining algebraic and side channel attacks on stream ciphers , 2017, 2017 International Conference on Communication Technologies (ComTech).

[2]  Swaroop Ghosh,et al.  Fault injection attacks on emerging non-volatile memory and countermeasures , 2018, HASP@ISCA.

[3]  Swaroop Ghosh,et al.  Side-Channel Attack on STTRAM Based Cache for Cryptographic Application , 2017, 2017 IEEE International Conference on Computer Design (ICCD).

[4]  Swaroop Ghosh,et al.  Information Leakage Attacks on Emerging Non-Volatile Memory and Countermeasures , 2018, ISLPED.

[5]  Harsha Ganegoda,et al.  Power Analysis Based Side Channel Attack , 2018, ArXiv.

[6]  William J Buchanan,et al.  Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA) , 2017 .

[7]  Donglin Su,et al.  AES Design Improvements Towards Information Security Considering Scan Attack , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[8]  Christophe Clavier,et al.  Correlation Power Analysis with a Leakage Model , 2004, CHES.

[9]  Vikas Gupta,et al.  Image denoising using wavelet transform method , 2013, 2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN).

[10]  Yu-Feng Li,et al.  Image denoising based on undecimated discrete wavelet transform , 2007, 2007 International Conference on Wavelet Analysis and Pattern Recognition.