-
3
-
-
85084095841
-
Designing and implementing malicious hardware
-
King, S.T., Tucek, J., Cozzie, A., Grier, C., Jiang, W., Zhou, Y.: Designing and implementing malicious hardware. In: Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), pp. 1-8 (2008)
-
(2008)
Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
, pp. 1-8
-
-
King, S.T.1
Tucek, J.2
Cozzie, A.3
Grier, C.4
Jiang, W.5
Zhou, Y.6
-
4
-
-
54049130356
-
Cryptanalysis with COPACOBANA
-
Güneysu, T., Kasper, T., Novotny, M., Paar, C., Rupp, A.: Cryptanalysis with COPACOBANA. IEEE Transactions on Computers 57(11), 1498-1513 (2008)
-
(2008)
IEEE Transactions on Computers
, vol.57
, Issue.11
, pp. 1498-1513
-
-
Güneysu, T.1
Kasper, T.2
Novotny, M.3
Paar, C.4
Rupp, A.5
-
5
-
-
84894124907
-
Hardware Trojan Designs on BASYS FPGA Board
-
Chen, Z., Guo, X., Nagesh, R., Reddy, A., Gora, M., Maiti, A.: Hardware Trojan Designs on BASYS FPGA Board. In: Embedded System Challenge Contest in Cyber Security Awareness Week, CSAW (2008)
-
(2008)
Embedded System Challenge Contest in Cyber Security Awareness Week, CSAW
-
-
Chen, Z.1
Guo, X.2
Nagesh, R.3
Reddy, A.4
Gora, M.5
Maiti, A.6
-
6
-
-
70449705236
-
-
Kiamilev, F., Hoover, R.: Demonstration of Hardware Trojans. In: DEFCON 16, Las Vegas (2008)
-
Kiamilev, F., Hoover, R.: Demonstration of Hardware Trojans. In: DEFCON 16, Las Vegas (2008)
-
-
-
-
7
-
-
51849111151
-
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions
-
Wang, X., Tehranipoor, M., Plusquellic, J.: Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions. In: 1st IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), pp. 15-19 (2008)
-
(2008)
1st IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)
, pp. 15-19
-
-
Wang, X.1
Tehranipoor, M.2
Plusquellic, J.3
-
8
-
-
0031192065
-
IC Failure Analysis: Magic, Mystery, and Science
-
Soden, J.M., Anderson, R.E., Henderson, C.L.: IC Failure Analysis: Magic, Mystery, and Science. IEEE Design & Test of Computers 14, 59-69 (1997)
-
(1997)
IEEE Design & Test of Computers
, vol.14
, pp. 59-69
-
-
Soden, J.M.1
Anderson, R.E.2
Henderson, C.L.3
-
10
-
-
51849089785
-
On-Demand Transparency for Improving Hardware Trojan Detectability
-
Chakraborty, R., Paul, S., Bhunia, S.: On-Demand Transparency for Improving Hardware Trojan Detectability. In: 1st IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), pp. 48-50 (2008)
-
(2008)
1st IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)
, pp. 48-50
-
-
Chakraborty, R.1
Paul, S.2
Bhunia, S.3
-
11
-
-
34548719905
-
Trojan Detection using IC Fingerprinting
-
Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan Detection using IC Fingerprinting. In: IEEE Symposium on Security and Privacy, pp. 296-310 (2007)
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
12
-
-
0032097263
-
Introduction to Statistical Pattern Recognition
-
2nd edn, Academic Press, London
-
Fukunaga, K.: Introduction to Statistical Pattern Recognition, 2nd edn. Computer Science and Scientific Computing Series. Academic Press, London (1990)
-
(1990)
Computer Science and Scientific Computing Series
-
-
Fukunaga, K.1
-
13
-
-
57849119623
-
Power supply signal calibration techniques for improving detection resolution to hardware Trojans
-
ICCAD, pp
-
Rad, R.M., Wang, X., Tehranipoor, M., Plusquellic, J.: Power supply signal calibration techniques for improving detection resolution to hardware Trojans. In: International Conference on Computer-Aided Design (ICCAD), pp. 632-639 (2008)
-
(2008)
International Conference on Computer-Aided Design
, pp. 632-639
-
-
Rad, R.M.1
Wang, X.2
Tehranipoor, M.3
Plusquellic, J.4
-
15
-
-
84939573910
-
Differential Power Analysis
-
Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
-
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
16
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
18
-
-
84870532103
-
-
Resarch Center for Information Security RCIS
-
Resarch Center for Information Security (RCIS): Side-channel Attack Standard Evaluation Board (SASEBO), http://www.rcis.aist.go.jp/special/SASEBO/ index-en.html
-
Side-channel Attack Standard Evaluation Board (SASEBO)
-
-
-
20
-
-
33750689121
-
-
Gierlichs, B., Lemke-Rust, K., Paar, C.: Templates vs. Stochastic Methods. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 15-29. Springer, Heidelberg (2006)
-
Gierlichs, B., Lemke-Rust, K., Paar, C.: Templates vs. Stochastic Methods. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 15-29. Springer, Heidelberg (2006)
-
-
-
-
21
-
-
0346330044
-
Primitive polynomials over GF(2) of degree up to 660 with uniformly distributed coefficients
-
Rajski, J., Tyszer, J.: Primitive polynomials over GF(2) of degree up to 660 with uniformly distributed coefficients. Journal of Electronic Testing: theory and applications, 645-657 (2003)
-
(2003)
Journal of Electronic Testing: Theory and applications
, vol.645-657
-
-
Rajski, J.1
Tyszer, J.2
-
22
-
-
35248827733
-
-
Standaert, F., Oldenzeel, L., Samyde, D., Quisquater, J.: Power analysis of FPGAs: how practical is the attack? In: Y. K. Cheung, P., Constantinides, G.A. (eds.) FPL 2003. LNCS, 2778, pp. 701-711. Springer, Heidelberg (2003)
-
Standaert, F., Oldenzeel, L., Samyde, D., Quisquater, J.: Power analysis of FPGAs: how practical is the attack? In: Y. K. Cheung, P., Constantinides, G.A. (eds.) FPL 2003. LNCS, vol. 2778, pp. 701-711. Springer, Heidelberg (2003)
-
-
-
-
23
-
-
35248847436
-
-
Ors, S., Oswald, E., Preneel, B.: Power-analysis attacks on an FPGA - first experimental results. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, 2779, pp. 35-50. Springer, Heidelberg (2003)
-
Ors, S., Oswald, E., Preneel, B.: Power-analysis attacks on an FPGA - first experimental results. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 35-50. Springer, Heidelberg (2003)
-
-
-
|