CMOS STANDARD CELL STRUCTURE WITH LOWER DATA DEPENDENCE OF THE STATIC POWER CONSUMPTION

    公开(公告)号:WO2023057795A1

    公开(公告)日:2023-04-13

    申请号:PCT/IB2021/059200

    申请日:2021-10-07

    摘要: The PMOS block (104) is connected between the virtual supply node (102) and output (101). The NMOS block (105) is connected between the virtual ground node (103) and output (101). The input of the balancing inverter chain (200, 300, 400) is connected to the output O (101). The balancing inverter chain is composed of at least one inverter and the output of the chain is the output (Y) of the structure. The static CMOS circuit (100) is supplemented with any combination of the following circuits. The virtual supply node (102) is connected to the supply rail by a serial P-type transistor (111), which gate (G), is connected to the ground rail. The virtual ground node (103) is connected to the ground rail by the serial N-type transistor (112), which gate (G) is connected to the supply rail. The virtual supply node (102) is connected to the output (101) by the complementary P-type transistor (121). The virtual ground node (103) is connected to the output (101) by the N-type complementary transistor (122).

    METHOD AND APPARATUS FOR DETECTING AN ATTACK ON OR DEGRADATION OF AN ELECTRONIC CIRCUIT

    公开(公告)号:WO2023041911A1

    公开(公告)日:2023-03-23

    申请号:PCT/GB2022/052332

    申请日:2022-09-15

    申请人: AGILE ANALOG LTD

    IPC分类号: G06F21/75 G06F1/28 H04L9/00

    摘要: An apparatus for detecting an attack on, or degradation of, an electric circuit is disclosed herein. The apparatus comprises a voltage level detector configured to determine whether the voltage level of the electric circuit exceeds a maximum selected threshold value, and to generate a first binary voltage limitation signal having if the voltage level exceeds the maximum selected threshold value. The apparatus also comprises a marginal voltage level detector configured to determine whether the voltage level of the electric circuit exceeds a marginal selected threshold value, the marginal selected threshold value being less than the maximum selected threshold value, and to generate a second binary voltage limitation signal having if the voltage level exceeds the marginal selected threshold value. A safety monitoring system monitors the first and second binary voltage limitation signals and is configured to determine that a possible attack or degradation has taken place based on at least one of the first binary voltage limitation signal and the second binary voltage limitation signal.

    DEBUG-PORT CONTROL CIRCUITRY
    3.
    发明申请

    公开(公告)号:WO2023030947A1

    公开(公告)日:2023-03-09

    申请号:PCT/EP2022/073327

    申请日:2022-08-22

    IPC分类号: G06F21/75 G06F21/57

    摘要: An integrated-circuit device (1) comprising a non-volatile memory (NVM) (15), a debug port (21), and debug-port control circuitry (17) for controlling access to the integrated- circuit device (1) through the debug port (21). The debug-port control circuitry (17) is configured to read a first bit array and a second bit array from respective predetermined locations in the NVM (15) in a single read cycle. The second bit array is distinct from the first bit array, and at least the second bit array contains a plurality of bits. The debug-port control circuitry (17) is further configured to determine whether the first bit array has a first predetermined bit pattern and whether the second bit array has a pattern other than a second predetermined bit pattern, and to control access through the debug port (21) at least partly in dependence on said determination.

    METHOD AND APPARATUS FOR REDUCING THE RISK OF SUCCESSFUL SIDE CHANNEL AND FAULT INJECTION ATTACKS

    公开(公告)号:WO2022029443A1

    公开(公告)日:2022-02-10

    申请号:PCT/GB2021/052034

    申请日:2021-08-05

    摘要: There are described methods and apparatus for enhancing security when executing a computer algorithm comprising separately executable tasks, each of which produce an electrical signal when executed. The apparatus comprises memory in which at least part of the computer algorithm is stored as at least one pipeline, wherein the at least one pipeline comprising a plurality of separately executable tasks; and a processor. The processor is configured to receive a plurality of inputs to be processed by the computer algorithm; randomise the plurality of separately executable tasks at a pipeline level and/or at a task level; execute the randomised plurality of separately executable tasks, and repeat the randomising and executing steps until the computer algorithm has processed the plurality of inputs. In this way, at each repetition, the electrical signals produced when executing the plurality of separately executable tasks are randomised to enhance security.

    情報処理装置、情報処理方法及び情報処理プログラム

    公开(公告)号:WO2021140574A1

    公开(公告)日:2021-07-15

    申请号:PCT/JP2020/000196

    申请日:2020-01-07

    发明人: 中井 綱人

    IPC分类号: G06F21/75 G06F21/60 G06N20/00

    摘要: 演算手順変更部(100)は、機械学習により値が調整される学習パラメータを用いる演算を実行する演算実行タイミングが到来する度に、不規則に、演算手順を、変更前の演算手順にて演算を実行して得られる演算結果と同一の演算結果が得られる変更前の演算手順とは異なる演算手順に変更する。演算実行部(101)は、演算実行タイミングが到来する度に、演算手順変更部(100)による変更後の演算手順にて学習パラメータを用いた演算を実行する。

    METHOD FOR SECURE EXECUTING OF A SECURITY RELATED PROCESS

    公开(公告)号:WO2021122907A1

    公开(公告)日:2021-06-24

    申请号:PCT/EP2020/086662

    申请日:2020-12-17

    摘要: The present invention relates to a method for executing a security related process comprising at least a first operation and a subsequent programming operation of a memory area in a first memory row of a first memory of a system and using as input security data stored in said second memory of said system, wherein said first memory is a non-volatile memory and said system comprises a first memory charge pump, said method comprising, when the execution of said security related process is triggered: - opening (S2) the first memory row - charging (S3) said first memory charge pump, - performing (S4) said first operations of the security related process, based on said security data from the second memory, - performing (S5) said programming operation of said memory area in said opened first memory row using said charged charge pump..

    OBFUSCATION OF OPERATIONS IN COMPUTING DEVICES

    公开(公告)号:WO2021074595A1

    公开(公告)日:2021-04-22

    申请号:PCT/GB2020/052493

    申请日:2020-10-08

    申请人: ARM LIMITED

    IPC分类号: G06F21/55 G06F21/75 H04L9/00

    摘要: A method for obfuscation of operations using minimal additional hardware is presented herein. The method can begin by executing a first iteration of a set of computations, the execution of the set of computations resulting in a first iteration output. The method can continue by executing a second iteration of the set of computations, wherein the second execution is distinct from the first iteration but should satisfy a matching condition. The distinction can be a rearrangement of sub-operations, insertion of dummy sub-operations, or a combination of the two. After the iterations are complete, the iteration outputs can be compared. If the comparison of the first iteration output and the second iteration output satisfy the matching condition, the process result can be output. If the matching condition is not satisfied, an error detected signal can be output.