메뉴 건너뛰기




Volumn , Issue , 2009, Pages 117-122

MOLES: Malicious off-chip leakage enabled by side-channels

Author keywords

[No Author keywords available]

Indexed keywords

ADVANCED ENCRYPTION STANDARD; CMOS TECHNOLOGY; DESIGN SPACES; DESIGN VERIFICATION; ECONOMIC INCENTIVE; IP PROTECTION; MULTI-BITS; NOISE POWER; NOVEL TECHNIQUES; OFF-CHIP; ON CHIPS; POTENTIAL THREATS; SECRET INFORMATION; SEMICONDUCTOR INDUSTRY; SPREAD-SPECTRUM TECHNIQUES; STATISTICAL CORRELATION; TROJANS;

EID: 76349087818     PISSN: 10923152     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (129)

References (26)
  • 2
    • 44449083733 scopus 로고    scopus 로고
    • The hunt for the kill switch
    • S. Adee: The hunt for the kill switch. In: IEEE Spectrum, Vol. 45, Issue 5, pp. 34-39, 2008.
    • (2008) IEEE Spectrum , vol.45 , Issue.5 , pp. 34-39
    • Adee, S.1
  • 6
    • 51849107491 scopus 로고    scopus 로고
    • M. Banga, M. S. Hsiao: A Region Based Approach for the Identification of Hardware Trojans. In: IEEE HOST, pp. 40-47, 2008.
    • M. Banga, M. S. Hsiao: A Region Based Approach for the Identification of Hardware Trojans. In: IEEE HOST, pp. 40-47, 2008.
  • 7
    • 51849089785 scopus 로고    scopus 로고
    • R. Chakraborty, S. Paul, S. Bhunia: On-Demand Transparency for Improving Hardware Trojan Detectability. In: IEEE HOST, pp. 48-50, 2008.
    • R. Chakraborty, S. Paul, S. Bhunia: On-Demand Transparency for Improving Hardware Trojan Detectability. In: IEEE HOST, pp. 48-50, 2008.
  • 8
    • 70449134838 scopus 로고    scopus 로고
    • Y. Jin, N. Kupp, Y. Makris: Experiences in hardware Trojan design and implementation. In: IEEE HOST, pp. 50-57, 2009.
    • Y. Jin, N. Kupp, Y. Makris: Experiences in hardware Trojan design and implementation. In: IEEE HOST, pp. 50-57, 2009.
  • 9
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology CRYPTO
    • P. Kocher, J. Jaffe, B. Jun: Differential Power Analysis. In: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO), LNCS 1666, pp. 388-397, 1999.
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 10
    • 84943632039 scopus 로고    scopus 로고
    • P. Kocher: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: CRYPTO, pp. 104-113, 1996.
    • P. Kocher: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: CRYPTO, pp. 104-113, 1996.
  • 13
    • 70350724703 scopus 로고    scopus 로고
    • Analysis and mitigation of process variation impacts on power-attack tolerance
    • DAC, pp
    • L. Lin, W. Burleson: Analysis and mitigation of process variation impacts on power-attack tolerance, In: Proceedings of ACM/IEEE Design Automation Conference (DAC), pp. 238-243, 2009.
    • (2009) Proceedings of ACM/IEEE Design Automation Conference , pp. 238-243
    • Lin, L.1    Burleson, W.2
  • 14
    • 3042604811 scopus 로고    scopus 로고
    • A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation
    • K. Tiri, I. Verbauwhede: A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation. In: Design, Automation and Test in Europe (DATE), pp. 246-251, 2004.
    • (2004) Design, Automation and Test in Europe (DATE) , pp. 246-251
    • Tiri, K.1    Verbauwhede, I.2
  • 15
    • 57849147147 scopus 로고    scopus 로고
    • MUTE-AES: A multiprocessor architecture to prevent power analysis based side channel attack of the AES algorithm
    • J. Ambrose, S. Parameswaran, A. Ignjatovic: MUTE-AES: a multiprocessor architecture to prevent power analysis based side channel attack of the AES algorithm. In: ACM/IEEE ICCAD, pp. 678-684, 2008.
    • (2008) ACM/IEEE ICCAD , pp. 678-684
    • Ambrose, J.1    Parameswaran, S.2    Ignjatovic, A.3
  • 17
    • 57849119623 scopus 로고    scopus 로고
    • Power supply signal calibration techniques for improving detection resolution to hardware Trojans
    • R. M. Rad, X. Wang, M. Tehranipoor, J. Plusquellic: Power supply signal calibration techniques for improving detection resolution to hardware Trojans. In: ACM/IEEE ICCAD, pp. 632-639, 2008.
    • (2008) ACM/IEEE ICCAD , pp. 632-639
    • Rad, R.M.1    Wang, X.2    Tehranipoor, M.3    Plusquellic, J.4
  • 18
    • 51849095999 scopus 로고    scopus 로고
    • Y. Jin, Y. Makris: Hardware Trojan Detection Using Path Delay Fingerprint. In: IEEE HOST, pp. 51-57, 2008.
    • Y. Jin, Y. Makris: Hardware Trojan Detection Using Path Delay Fingerprint. In: IEEE HOST, pp. 51-57, 2008.
  • 19
    • 70449730263 scopus 로고    scopus 로고
    • L. Lin, M. Kasper, T. Güneysu, C. Paar, W. Burleson: Trojan sidechannels: lightweight hardware Trojans through side-channel engineering. In: CHES, LNCS 5747, pp. 382-395, 2009.
    • L. Lin, M. Kasper, T. Güneysu, C. Paar, W. Burleson: Trojan sidechannels: lightweight hardware Trojans through side-channel engineering. In: CHES, LNCS 5747, pp. 382-395, 2009.
  • 20
    • 51849124268 scopus 로고    scopus 로고
    • Y. Alkabani, F. Koushanfar: Extended Abstract: Designer's Hardware Trojan Horse, In: IEEE HOST, pp. 82-83, 2008.
    • Y. Alkabani, F. Koushanfar: Extended Abstract: Designer's Hardware Trojan Horse, In: IEEE HOST, pp. 82-83, 2008.
  • 21
    • 34547307341 scopus 로고    scopus 로고
    • Physical Unclonable Functions for Device Authentication and Secret Key Generation
    • G. Suh, S. Devadas: Physical Unclonable Functions for Device Authentication and Secret Key Generation, In: ACM/IEEE DAC, pp. 9-14, 2007.
    • (2007) ACM/IEEE DAC , pp. 9-14
    • Suh, G.1    Devadas, S.2
  • 24
    • 76349096687 scopus 로고    scopus 로고
    • S. Chari, J. R. Rao, P. Rohatgi: Template attacks, In: CHES, LNCS 2523, pp. 12-28, 2002.
    • S. Chari, J. R. Rao, P. Rohatgi: Template attacks, In: CHES, LNCS 2523, pp. 12-28, 2002.
  • 26
    • 0346330044 scopus 로고    scopus 로고
    • Primitive polynomials over GF(2) of degree up to 660 with uniformly distributed coefficients
    • J. Rajski, J. Tyszer: Primitive polynomials over GF(2) of degree up to 660 with uniformly distributed coefficients. In: Journal of Electronic Testing: theory and applications, pp. 645-657, 2003.
    • (2003) Journal of Electronic Testing: Theory and applications , pp. 645-657
    • Rajski, J.1    Tyszer, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.