-
2
-
-
44449083733
-
The hunt for the kill switch
-
S. Adee: The hunt for the kill switch. In: IEEE Spectrum, Vol. 45, Issue 5, pp. 34-39, 2008.
-
(2008)
IEEE Spectrum
, vol.45
, Issue.5
, pp. 34-39
-
-
Adee, S.1
-
4
-
-
85084095841
-
Designing and implementing malicious hardware
-
S. T. King, J. Tucek, A. Cozzie, C. Grier, W. Jiang, Y. Zhou: Designing and implementing malicious hardware. In: Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), pp. 1-8, 2008.
-
(2008)
Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
, pp. 1-8
-
-
King, S.T.1
Tucek, J.2
Cozzie, A.3
Grier, C.4
Jiang, W.5
Zhou, Y.6
-
5
-
-
0031192065
-
IC Failure Analysis: Magic, Mystery, and Science
-
J. M. Soden, R. E. Anderson, C. L. Henderson: IC Failure Analysis: Magic, Mystery, and Science. In: IEEE Design & Test of Computers, Vol. 14, pp. 59-69, 1997.
-
(1997)
IEEE Design & Test of Computers
, vol.14
, pp. 59-69
-
-
Soden, J.M.1
Anderson, R.E.2
Henderson, C.L.3
-
6
-
-
51849107491
-
-
M. Banga, M. S. Hsiao: A Region Based Approach for the Identification of Hardware Trojans. In: IEEE HOST, pp. 40-47, 2008.
-
M. Banga, M. S. Hsiao: A Region Based Approach for the Identification of Hardware Trojans. In: IEEE HOST, pp. 40-47, 2008.
-
-
-
-
7
-
-
51849089785
-
-
R. Chakraborty, S. Paul, S. Bhunia: On-Demand Transparency for Improving Hardware Trojan Detectability. In: IEEE HOST, pp. 48-50, 2008.
-
R. Chakraborty, S. Paul, S. Bhunia: On-Demand Transparency for Improving Hardware Trojan Detectability. In: IEEE HOST, pp. 48-50, 2008.
-
-
-
-
8
-
-
70449134838
-
-
Y. Jin, N. Kupp, Y. Makris: Experiences in hardware Trojan design and implementation. In: IEEE HOST, pp. 50-57, 2009.
-
Y. Jin, N. Kupp, Y. Makris: Experiences in hardware Trojan design and implementation. In: IEEE HOST, pp. 50-57, 2009.
-
-
-
-
9
-
-
84939573910
-
Differential Power Analysis
-
Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology CRYPTO
-
P. Kocher, J. Jaffe, B. Jun: Differential Power Analysis. In: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO), LNCS 1666, pp. 388-397, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
10
-
-
84943632039
-
-
P. Kocher: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: CRYPTO, pp. 104-113, 1996.
-
P. Kocher: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: CRYPTO, pp. 104-113, 1996.
-
-
-
-
12
-
-
38049074796
-
Power and EM attacks on passive 13.56 MHz RFID devices
-
CHES, pp
-
M. Hutter, S. Mangard, M. Feldhofer: Power and EM attacks on passive 13.56 MHz RFID devices, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp. 320-333, 2007.
-
(2007)
Workshop on Cryptographic Hardware and Embedded Systems
, pp. 320-333
-
-
Hutter, M.1
Mangard, S.2
Feldhofer, M.3
-
13
-
-
70350724703
-
Analysis and mitigation of process variation impacts on power-attack tolerance
-
DAC, pp
-
L. Lin, W. Burleson: Analysis and mitigation of process variation impacts on power-attack tolerance, In: Proceedings of ACM/IEEE Design Automation Conference (DAC), pp. 238-243, 2009.
-
(2009)
Proceedings of ACM/IEEE Design Automation Conference
, pp. 238-243
-
-
Lin, L.1
Burleson, W.2
-
14
-
-
3042604811
-
A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation
-
K. Tiri, I. Verbauwhede: A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation. In: Design, Automation and Test in Europe (DATE), pp. 246-251, 2004.
-
(2004)
Design, Automation and Test in Europe (DATE)
, pp. 246-251
-
-
Tiri, K.1
Verbauwhede, I.2
-
15
-
-
57849147147
-
MUTE-AES: A multiprocessor architecture to prevent power analysis based side channel attack of the AES algorithm
-
J. Ambrose, S. Parameswaran, A. Ignjatovic: MUTE-AES: a multiprocessor architecture to prevent power analysis based side channel attack of the AES algorithm. In: ACM/IEEE ICCAD, pp. 678-684, 2008.
-
(2008)
ACM/IEEE ICCAD
, pp. 678-684
-
-
Ambrose, J.1
Parameswaran, S.2
Ignjatovic, A.3
-
16
-
-
34548719905
-
Trojan Detection using IC Fingerprinting
-
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, B. Sunar: Trojan Detection using IC Fingerprinting. In: IEEE Symposium on Security and Privacy, pp. 296-310, 2007.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
17
-
-
57849119623
-
Power supply signal calibration techniques for improving detection resolution to hardware Trojans
-
R. M. Rad, X. Wang, M. Tehranipoor, J. Plusquellic: Power supply signal calibration techniques for improving detection resolution to hardware Trojans. In: ACM/IEEE ICCAD, pp. 632-639, 2008.
-
(2008)
ACM/IEEE ICCAD
, pp. 632-639
-
-
Rad, R.M.1
Wang, X.2
Tehranipoor, M.3
Plusquellic, J.4
-
18
-
-
51849095999
-
-
Y. Jin, Y. Makris: Hardware Trojan Detection Using Path Delay Fingerprint. In: IEEE HOST, pp. 51-57, 2008.
-
Y. Jin, Y. Makris: Hardware Trojan Detection Using Path Delay Fingerprint. In: IEEE HOST, pp. 51-57, 2008.
-
-
-
-
19
-
-
70449730263
-
-
L. Lin, M. Kasper, T. Güneysu, C. Paar, W. Burleson: Trojan sidechannels: lightweight hardware Trojans through side-channel engineering. In: CHES, LNCS 5747, pp. 382-395, 2009.
-
L. Lin, M. Kasper, T. Güneysu, C. Paar, W. Burleson: Trojan sidechannels: lightweight hardware Trojans through side-channel engineering. In: CHES, LNCS 5747, pp. 382-395, 2009.
-
-
-
-
20
-
-
51849124268
-
-
Y. Alkabani, F. Koushanfar: Extended Abstract: Designer's Hardware Trojan Horse, In: IEEE HOST, pp. 82-83, 2008.
-
Y. Alkabani, F. Koushanfar: Extended Abstract: Designer's Hardware Trojan Horse, In: IEEE HOST, pp. 82-83, 2008.
-
-
-
-
21
-
-
34547307341
-
Physical Unclonable Functions for Device Authentication and Secret Key Generation
-
G. Suh, S. Devadas: Physical Unclonable Functions for Device Authentication and Secret Key Generation, In: ACM/IEEE DAC, pp. 9-14, 2007.
-
(2007)
ACM/IEEE DAC
, pp. 9-14
-
-
Suh, G.1
Devadas, S.2
-
24
-
-
76349096687
-
-
S. Chari, J. R. Rao, P. Rohatgi: Template attacks, In: CHES, LNCS 2523, pp. 12-28, 2002.
-
S. Chari, J. R. Rao, P. Rohatgi: Template attacks, In: CHES, LNCS 2523, pp. 12-28, 2002.
-
-
-
-
26
-
-
0346330044
-
Primitive polynomials over GF(2) of degree up to 660 with uniformly distributed coefficients
-
J. Rajski, J. Tyszer: Primitive polynomials over GF(2) of degree up to 660 with uniformly distributed coefficients. In: Journal of Electronic Testing: theory and applications, pp. 645-657, 2003.
-
(2003)
Journal of Electronic Testing: Theory and applications
, pp. 645-657
-
-
Rajski, J.1
Tyszer, J.2
|