Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs


By shrinking the technology and reducing the energy requirements of integrated circuits, producing ultra-low-power devices has practically become possible. Texas Instruments as a pioneer in developing FRAM-based products announced a couple of different microcontroller (MCU) families based on the low-power and fast Ferroelectric RAM technology. Such MCUs come with embedded cryptographic module(s) as well as the assertion that – due to the underlying ultra-low-power technology – mounting successful side-channel analysis (SCA) attacks has become very difficult. In this work we practically evaluate this claimed hardness by means of state-of-the-art power analysis attacks. The leakage sources and corresponding attacks are presented in order to give an overview on the potential risks of making use of such platforms in security-related applications. In short, we partially confirm the given assertion. Some modules, e.g., the embedded cryptographic accelerator, can still be attacked but with slightly immoderate effort. On the contrary, the other leakage sources are easily exploitable leading to straightforward attacks being able to recover the secrets.

DOI: 10.1007/978-3-319-21476-4_16

Extracted Key Phrases

11 Figures and Tables

Cite this paper

@article{Moradi2015SideChannelSA, title={Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs}, author={Amir Moradi and Gesine Hinterw{\"a}lder}, journal={IACR Cryptology ePrint Archive}, year={2015}, volume={2015}, pages={199} }