Specifications of Side-Channel Security Evaluation Labs Targeting Hardware Implementations

 

No. Team Evaluation Platform Target FPGA Family Target Boards Leakage Assessment Methods Attacks Full Specification Contact Team Members
1 Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria NewAE ChipWhisper Artix-7 NewAE CW305 t-test Lab_SW_HW_IAIK_Graz_Austria Rishub Nagpal rishub.nagpal@lamarr.at Stefan Mangard, Rishub Nagpal, Robert Primas, Thomas Steinbauer
2 Telecom Paris, France Spartan-6, Virtex-5, Virtex-II Pro, Stratix II SASEBO-W, SASEBO-GII, SASEBO-G/SASEBO-R, SASEBO-B NICV, t-test, chi-squared test, DL-LA SPA, DPA, CPA, MIA, TA, LRA, etc.; SEMA, DEMA, CEMA, etc.; SFA, DFA, FSA, DFIA, FBA, etc. Lab_SW_HW_Telecom_Paris_France Laurent Sauvage, laurent.sauvage@telecom-paris.fr Laurent Sauvage, Arnaud Varillon, Alexandre Sanson
3 Cryptology and Computer Security Laboratory, Shanghai Jiao Tong University, China Riscure Inspector, NewAE ChipWhisper, SAKURA Kintex-7, Spartan-6, SAKURA-G, SAKURA-X t-test, chi-squared test, DL-LA CPA, TA, MIA, DL-based methods Lab_SW_HW_SJTU_China Dawu Gu, dwgu@sjtu.edu.cn Dawu Gu, Chi Zhang, Xiangjun Lu, Pei Cao, Tengfei Wang, Shipei Qu, Xiaolin Zhang, Yuhang Ji, Hongyi Zhang
4 Hardware Security and Cryptographic Processor Lab, Tsinghua University, Beijing, China SAKURA Kintex-7, Spartan-6 SAKURA-G, SAKURA-X NICV, t-test, chi-squared test SPA, DPA, CPA, MIA, TA, LRA, etc. Lab_SW_HW_Tsinghua_China Bohan Yang, bohanyang@tsinghua.edu.cn Leibo Liu, Wenping Zhu, Shuying Yin, Bohan Yang, Cankun Zhao, Shuohang Peng
5 CESCA Lab, Radboud University, the Netherlands Riscure Inspector, NewAE ChipWhisper, Jupyter notebook scripts Artix-7, Spartan-6 NewAE CW305, SAKURA-G t-test, chi-squared test, DL-LA SPA, DPA, CPA, TA; DEMA; DFA, FI attacks Lab_SW_HW_CESCA_Radboud_the_Netherlands Lejla Batina, lejla@cs.ru.nl Lejla Batina, Ileana Buhan, Lukasz Chmielewski, Leo Weissbart, Konstantina Miteloudi, Asmita Adhikary, Azade Rezaeezade, Vahid Jahandideh, Tom Stock, Ellen Gunnarsdottir
6 Secure-IC, France Secure-IC Analyzr, SAKURA Spartan-6 SAKURA-G Tests specified in ISO/IEC 17825:2016 Lab_HW_Secure-IC_France Sylvain Guilley, sylvain.guilley@secure-ic.com; Khaled Karray, khaled.karray@secure-ic.com Sylvain Guilley, Khaled Karray
7 Cryptographic Engineering Research Group (CERG), George Mason University, USA FOBOS3 Artix-7 NewAE CW305 t-test Lab_HW_CERG_GMU_USA Jens-Peter Kaps, jkaps@gmu.edu; Kris Gaj, kgaj@gmu.edu Jens-Peter Kaps, Kris Gaj, Abubakr Abdulgadir, Kamyar Mohajerani
8 Ruhr-Universitat Bochum, Germany SILVER and other simulation-based probing security leakage-detection tools simulation-based probing security evaluation Amir Moradi, amir.moradi@rub.de; Nicolai Mueller, nicolai.mueller@rub.de Amir Moradi, Nicolai Mueller