{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T06:40:01Z","timestamp":1750401601841,"version":"3.41.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T00:00:00Z","timestamp":1744934400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T00:00:00Z","timestamp":1744934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2025,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The lightweight cryptography (LWC) standardization process by the National Institute of Standards and Technology (NIST) of the US is the latest example of competitions that require benchmarking and side-channel leakage evaluation of hardware and software implementations of a multitude of candidate algorithms. A common hardware application programming interface (API) streamlines the development of a test harness. However, no existing platform is directly compatible with the LWC algorithms\u2019 hardware interface. Hence, a significant effort is needed to evaluate and benchmark a large number of candidates. This paper presents an open-source, multi-user platform for side-channel analysis and benchmarking we call FOBOS\u00a03. It contains its own measurement board (FOBOS Shield), target board (FBD-A7 with Xilinx Artix-7-A12 FPGA), and Multi-Target Connector (MTC) to use microcontroller boards from Texas Instruments and ST Microelectronics. It enables side-channel leakage evaluation as well as measurement of power and energy consumption on both: FPGA and microcontroller targets. Case studies are included to highlight these features.<\/jats:p>","DOI":"10.1007\/s13389-025-00368-6","type":"journal-article","created":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T16:22:58Z","timestamp":1744993378000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FOBOS\u00a03: an open-source platform for side-channel analysis and benchmarking"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-2154-2963","authenticated-orcid":false,"given":"Eduardo","family":"Ferrufino","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5257-4662","authenticated-orcid":false,"given":"Luke","family":"Beckwith","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8032-6012","authenticated-orcid":false,"given":"Abubakr","family":"Abdulgadir","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7036-6433","authenticated-orcid":false,"given":"Jens-Peter","family":"Kaps","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,18]]},"reference":[{"key":"368_CR1","doi-asserted-by":"publisher","unstructured":"Abdulgadir, A., Diehl, W., Kaps, J-P.: An Open-Source Platform for Evaluation of Hardware Implementations of Lightweight Authenticated Ciphers. In: 2019 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2019, Cancun, Mexico. (2019) https:\/\/doi.org\/10.1109\/ReConFig48160.2019.8994788","DOI":"10.1109\/ReConFig48160.2019.8994788"},{"key":"368_CR2","doi-asserted-by":"publisher","unstructured":"Abdulgadir, A., Kaps, J-P., Salman, A.: Enhancing Information Security Courses With Remotely Accessible Side-Channel Analysis Setup. In Proceedings of the 2022 on Great Lakes Symposium on VLSI. ACM, Irvine, CA. (2022) https:\/\/doi.org\/10.1145\/3526241.3530347","DOI":"10.1145\/3526241.3530347"},{"key":"368_CR3","unstructured":"Bernstein, D.J., Lange, T.: eBACS: ECRYPT Benchmarking of Cryptographic Systems. (2024) https:\/\/bench.cr.yp.to"},{"key":"368_CR4","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Cryptographic Hardware and Embedded Systems - CHES 2004, pp. 16\u201329. Springer, Berlin (2004)"},{"key":"368_CR5","unstructured":"George, M.:\u00a0University Cryptographic Engineering Research\u00a0Group. 2022. Assignments, Commitments, and Reports of the LWC Side-Channel Security Evaluation Labs Targeting Hardware Implementations. (2022)https:\/\/cryptography.gmu.edu\/athena\/LWC\/Lab_Implementation_Matching_HW.html"},{"key":"368_CR6","doi-asserted-by":"publisher","unstructured":"De Canni\u00e8re, C., Preneel, B.: Trivium. Springer, Berlin Heidelberg, Berlin, Heidelberg 244\u2013266,(2008). https:\/\/doi.org\/10.1007\/978-3-540-68351-3_18","DOI":"10.1007\/978-3-540-68351-3_18"},{"key":"368_CR7","doi-asserted-by":"crossref","unstructured":"Ferrufino, E., Beckwith, L., Abdulgadir, A., Kaps, J-P.: FOBOS 3: An Open-Source Platform for Side-Channel Analysis and Benchmarking. In Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security. Association for Computing Machinery, Copenhagen, Denmark, 5\u201314 (2023)","DOI":"10.1145\/3605769.3623987"},{"key":"368_CR8","unstructured":"Goodwill, G., Jun, B., Jaffe, J., Rohatgi, P.: A Testing methodology for sideChannel resistance validation. In NIST Non-invasive Attack Testing Workshop, Nara, Japan (2011)"},{"key":"368_CR9","doi-asserted-by":"crossref","unstructured":"Guntur, H., Ishii, J., Satoh, A.: Side-Channel AttacK User Reference Architecture Board SAKURA-G. In: 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE), pp. 271\u2013274. IEEE, Tokyo, Japan (2014)","DOI":"10.1109\/GCCE.2014.7031104"},{"key":"368_CR10","unstructured":"Homsirikamol, E., Diehl, W., Ferozpuri, A., Farahmand, F., Yalla, P., Kaps, J-P., Gaj, K.: CAESAR Hardware API. Cryptology ePrint Archive, Report 2016\/626. (2016) https:\/\/eprint.iacr.org\/2016\/626"},{"key":"368_CR11","doi-asserted-by":"crossref","unstructured":"Iokibe, K., Kan, T., Toyota, Y.: A Study on Evaluation Board Requirements for Assessing Vulnerability of Cryptographic Modules to Side-Channel Attacks. In International Symposium on Electromagnetic Compatibility & Signal\/Power Integrity (EMCSI). Reno, NV, USA (2020)","DOI":"10.1109\/EMCSI38923.2020.9191655"},{"key":"368_CR12","unstructured":"Kaps, J-P., Diehl, W., Tempelmeier, M., Homsirikamol, E., Gaj, K.: Hardware API for Lightweight Cryptography v1.1 (with support for SCA-protected implementations). (2022) https:\/\/cryptography.gmu.edu\/athena\/LWC\/LWC_HW_API_v1_1.pdf"},{"key":"368_CR13","unstructured":"Katashita, T., Satoh, A., Kikuchi, K., Nakagawa, H., Aoyagi, M.: Evaluation of DPA charactersitics of SASEBO for board level simulations. In First International Workshop on constructive side channel analysis an secure design. COSADE (2010)"},{"key":"368_CR14","doi-asserted-by":"publisher","unstructured":"Knichel, D., Moradi, A., M\u00fcller, N., Sasdrich, P.: Automated Generation of Masked Hardware. IACR Transactions on Cryptographic Hardware and Embedded Systems 2022, 1 (2022), 589\u2013629. (2022) https:\/\/doi.org\/10.46586\/tches.v2022.i1.589-629","DOI":"10.46586\/tches.v2022.i1.589-629"},{"key":"368_CR15","doi-asserted-by":"publisher","unstructured":"Kocher, P., Jaffe, J., Jun, B., Rohatgi, P.: Introduction to Differential Power Analysis. Journal of Cryptographic Engineering 1, 1 (April 2011), 5\u201327. (2011) https:\/\/doi.org\/10.1007\/s13389-011-0006-y","DOI":"10.1007\/s13389-011-0006-y"},{"key":"368_CR16","unstructured":"kokke. 2024. kokke\/tiny-AES-c. https:\/\/github.com\/kokke\/tiny-AES-c original-date: 2012-05-24T15:27:24Z"},{"key":"368_CR17","doi-asserted-by":"publisher","unstructured":"Meidanis, D., Georgopoulos, K., Papaefstathiou, I.: FPGA Power Consumption Measurements and Estimations Under Different Implementation Parameters. In 2011 International Conference on Field-Programmable Technology. (2011) https:\/\/doi.org\/10.1109\/FPT.2011.6132694","DOI":"10.1109\/FPT.2011.6132694"},{"key":"368_CR18","doi-asserted-by":"publisher","unstructured":"Moradi, A., Hinterw\u00e4lder, G.: Side-Channel Security Analysis of Ultra-Low-Power FRAM-Based MCUs. In Constructive Side-Channel Analysis and Secure Design, Stefan Mangard and Axel\u00a0Y. Poschmann (Eds.), Vol.\u00a09064. Springer International Publishing, Cham, 239\u2013254. https:\/\/doi.org\/10.1007\/978-3-319-21476-4_16 Series Title: Lecture Notes in Computer Science (2015)","DOI":"10.1007\/978-3-319-21476-4_16"},{"key":"368_CR19","unstructured":"NewAE. 2014. OpenADC Product Datasheet. http:\/\/newae.com\/files\/openadc-datasheet.pdf"},{"key":"368_CR20","unstructured":"NIST. 2018. Submission Requirements and Evaluation Criteria for the Lightweight Cryptography Standardization Process. https:\/\/csrc.nist.gov\/csrc\/media\/Projects\/lightweight-cryptography\/documents\/final-lwc-submission-requirements-august2018.pdf"},{"key":"368_CR21","unstructured":"O\u2019Flynn, C.: A Framework for Embedded Hardware Security Analysis. Ph.D. Dissertation. Dalhousie University, Halifax, Nova Scotia (2017)"},{"key":"368_CR22","doi-asserted-by":"publisher","unstructured":"Oliver, J. P., Acle, J. P\u00e9rez Boemo, E.: Power Estimations vs. Power Measurements in Spartan-6 Devices. In 2014 IX Southern Conference on Programmable Logic (SPL). (2014) https:\/\/doi.org\/10.1109\/SPL.2014.7002214","DOI":"10.1109\/SPL.2014.7002214"},{"key":"368_CR23","doi-asserted-by":"publisher","unstructured":"Oliver, J.P., Boemo, E.: Power Estimations vs. Power Measurements in Cyclone III Devices. In 2011 VII Southern Conference on Programmable Logic (SPL). IEEE, Cordoba, Argentina. (2011) https:\/\/doi.org\/10.1109\/SPL.2011.5782630","DOI":"10.1109\/SPL.2011.5782630"},{"key":"368_CR24","unstructured":"Primas, Robert: NIST LWC Hardware Reference Implementation of Ascon v1.2. (2020) https:\/\/github.com\/ascon\/ascon-hardware"},{"key":"368_CR25","unstructured":"Rambus. 2019. DPA Workstation Analysis Platform - Rambus. https:\/\/www.rambus.com\/security\/dpa-countermeasures\/dpa-workstation-platform\/"},{"key":"368_CR26","unstructured":"Riscure.: Side Channel Analysis Security Tools. (2019) https:\/\/www.riscure.com\/security-tools\/inspector-sca\/"},{"key":"368_CR27","unstructured":"Ruhr-University Bochum. [n.d.]. Chair for Security Engineering GitHub. https:\/\/github.com\/Chair-for-Security-Engineering\/LWC-Masking"},{"key":"368_CR28","doi-asserted-by":"crossref","unstructured":"Schneider, T., Moradi, A.: Leakage Assessment Methodology - a Clear Roadmap for Side-Channel Evaluations. Cryptology ePrint Archive 2015\/207 (2015)","DOI":"10.1007\/978-3-662-48324-4_25"},{"key":"368_CR29","unstructured":"Steinbauer, T., Nagpal, R., Primas, R., Mangard, S.: TVLA On Selected NIST LWC Finalists. Technical Report (2022)"},{"key":"368_CR30","unstructured":"The\u00a0Xoodyak Team. 2021. Unprotected Hardware Xoodyak Implantation. https:\/\/github.com\/KeccakTeam\/Xoodoo"},{"key":"368_CR31","unstructured":"Velegalati, R., Kaps, J-P.: Introducing FOBOS: Flexible Open-source BOard for Side-channel analysis. Work in Progress (WiP), Third International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2012 (2012)"},{"key":"368_CR32","unstructured":"Zhao, C., Zhao, H., Yang, W., Zhu, W., Liu, L.: Leakage Assessment Report for Xoodyak R3 First Order. Technical Report (2022)"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-025-00368-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13389-025-00368-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-025-00368-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T05:59:06Z","timestamp":1750399146000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13389-025-00368-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,18]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["368"],"URL":"https:\/\/doi.org\/10.1007\/s13389-025-00368-6","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"type":"print","value":"2190-8508"},{"type":"electronic","value":"2190-8516"}],"subject":[],"published":{"date-parts":[[2025,4,18]]},"assertion":[{"value":"15 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"10"}}