Irradiation side-channel attack on cryptographic chip

Irradiation Side-Channel Attack (ISCA) is an innovation for cracking cryptosystem and circuit structure without physical damage. Based on the ISCA architecture design, we proposed an irradiation centric side-channel attack model to induce the cryptographic chip to generate soft error, and we build an irradiation soft error model to present the circuit's behavior. We design a formal verification via the model checking method to analyze and evaluate whether the result or the effect of the circuit's side-channel leakage is consistent with the predefined soft error model. On the basis of the soft error model, we build a model checking process model and an ISCA prototype to implement side-channel attack to get internal key information about chips' integrated circuits. This is illustrated using an ISCA simulation scenario on cryptographic chips' SRAM and Flash. Experimental results show that the proposed method is feasible and effective.