-
1
-
-
34548719905
-
Trojan detection using IC fingerprinting
-
Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan Detection using IC Fingerprinting. In: IEEE Symposium on Security and Privacy (SP 2007), pp. 296-310 (2007)
-
(2007)
IEEE Symposium on Security and Privacy (SP 2007)
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
2
-
-
35048818034
-
Correlation power analysis with a leakage model
-
In: Joye, M., Quisquater, J.-J. (eds.) LNCS, Springer, Heidelberg
-
Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29. Springer, Heidelberg (2004)
-
(2004)
CHES 2004
, vol.3156
, pp. 16-29
-
-
Brier, E.1
Clavier, C.2
Olivier, F.3
-
3
-
-
27244440344
-
A very compact S-box for AES
-
In: Rao, J.R., Sunar, B. (eds.) LNCS, Springer, Heidelberg
-
Canright, D.: A very compact S-box for AES. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 441-455. Springer, Heidelberg (2005)
-
(2005)
CHES 2005
, vol.3659
, pp. 441-455
-
-
Canright, D.1
-
5
-
-
51049117070
-
Mutual information analysis
-
In: Oswald, E., Rohatgi, P. (eds.) LNCS, Springer, Heidelberg
-
Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual Information Analysis. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 426-442. Springer, Heidelberg (2008)
-
(2008)
CHES 2008
, vol.5154
, pp. 426-442
-
-
Gierlichs, B.1
Batina, L.2
Tuyls, P.3
Preneel, B.4
-
6
-
-
84861728017
-
Counterfeit chips on the rise
-
Gorman, C.: Counterfeit chips on the rise. IEEE Spectrum 49(6), 16-17 (2012)
-
(2012)
IEEE Spectrum
, vol.49
, Issue.6
, pp. 16-17
-
-
Gorman, C.1
-
7
-
-
84881229522
-
Analysis of intel's ivy bridge digital random number generator
-
Cryptography Research INC. (March)
-
Hamburg, M., Kocher, P., Marson, M.E.: Analysis of Intel's Ivy Bridge Digital Random Number Generator. Technical Report, Cryptography Research INC. (March 2012)
-
(2012)
Technical Report
-
-
Hamburg, M.1
Kocher, P.2
Marson, M.E.3
-
8
-
-
77955218749
-
Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically
-
Hicks, M., Finnicum, M., King, S.T., Martin, M.M., Smith, J.M.: Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically. In: IEEE Symposium on Security and Privacy (SP 2010), pp. 159-172 (2010)
-
(2010)
IEEE Symposium on Security and Privacy (SP 2010)
, pp. 159-172
-
-
Hicks, M.1
Finnicum, M.2
King, S.T.3
Martin, M.M.4
Smith, J.M.5
-
10
-
-
85084095841
-
Designing and implementing malicious hardware
-
King, S.T., Tucek, J., Cozzie, A., Grier, C., Jiang, W., Zhou, Y.: Designing and implementing malicious hardware. In: Proceedings of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET 2008), pp. 1-8 (2008)
-
(2008)
Proceedings of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET 2008)
, pp. 1-8
-
-
King, S.T.1
Tucek, J.2
Cozzie, A.3
Grier, C.4
Jiang, W.5
Zhou, Y.6
-
12
-
-
70449730263
-
Trojan side-channels: Lightweight hardware trojans through side-channel engineering
-
In: Clavier, C., Gaj, K. (eds.) LNCS, Springer, Heidelberg
-
Lin, L., Kasper, M., Güneysu, T., Paar, C., Burleson, W.: Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 382-395. Springer, Heidelberg (2009)
-
(2009)
CHES 2009
, vol.5747
, pp. 382-395
-
-
Lin, L.1
Kasper, M.2
Güneysu, T.3
Paar, C.4
Burleson, W.5
-
14
-
-
84890594066
-
Masked dual-rail precharge logic encounters state-of-the-art power analysis methods
-
Moradi, A., Kirschbaum, M., Eisenbarth, T., Paar, C.: Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 99, 1-13 (2011)
-
(2011)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
, vol.99
, pp. 1-13
-
-
Moradi, A.1
Kirschbaum, M.2
Eisenbarth, T.3
Paar, C.4
-
15
-
-
84871098932
-
-
Nangate Inc. version PDKv1 3 v2010 12 (August.)
-
Nangate Inc. Nangate Open Cell Library, version PDKv1 3 v2010 12 (August. 2011), http://www.si2.org/openeda.si2.org/projects/nangatelib
-
(2011)
Nangate Open Cell Library
-
-
-
16
-
-
38049043381
-
Evaluation of the masked logic style MDPL on a prototype chip
-
In: Paillier, P., Verbauwhede, I. (eds.) LNCS, Springer, Heidelberg
-
Popp, T., Kirschbaum, M., Zefferer, T., Mangard, S.: Evaluation of the Masked Logic Style MDPL on a Prototype Chip. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 81-94. Springer, Heidelberg (2007)
-
(2007)
CHES 2007
, vol.4727
, pp. 81-94
-
-
Popp, T.1
Kirschbaum, M.2
Zefferer, T.3
Mangard, S.4
-
17
-
-
27244451515
-
Masked dual-rail pre-charge logic: DPA-resistance without routing constraints
-
In: Rao, J.R., Sunar, B. (eds.) LNCS, Springer, Heidelberg
-
Popp, T., Mangard, S.: Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 172-186. Springer, Heidelberg (2005)
-
(2005)
CHES 2005
, vol.3659
, pp. 172-186
-
-
Popp, T.1
Mangard, S.2
-
18
-
-
83455196098
-
Blue team red team approach to hardware trust assessment
-
In: (October)
-
Rajendran, J., Jyothi, V., Karri, R.: Blue team red team approach to hardware trust assessment. In: IEEE 29th International Conference on Computer Design (ICCD 2011), pp. 285-288 (October 2011)
-
(2011)
IEEE 29th International Conference on Computer Design (ICCD 2011)
, pp. 285-288
-
-
Rajendran, J.1
Jyothi, V.2
Karri, R.3
-
19
-
-
79959669568
-
Design and analysis of ring oscillator based design-for-trust technique
-
Rajendran, J., Jyothi, V., Sinanoglu, O., Karri, R.: Design and analysis of ring oscillator based Design-for-Trust technique. In: 29th IEEE VLSI Test Symposium (VTS 2011), pp. 105-110 (2011)
-
(2011)
29th IEEE VLSI Test Symposium (VTS 2011)
, pp. 105-110
-
-
Rajendran, J.1
Jyothi, V.2
Sinanoglu, O.3
Karri, R.4
-
21
-
-
77956948329
-
Process reliability based trojans through NBTI and HCI effects
-
Shiyanovskii, Y., Wolff, F., Rajendran, A., Papachristou, C., Weyer, D., Clay, W.: Process reliability based trojans through NBTI and HCI effects. In: NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2010), pp. 215-222 (2010)
-
(2010)
NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2010)
, pp. 215-222
-
-
Shiyanovskii, Y.1
Wolff, F.2
Rajendran, A.3
Papachristou, C.4
Weyer, D.5
Clay, W.6
-
22
-
-
84890620790
-
Circuit camouflage technology - SMI IP protection and anti-tamper technologies
-
SypherMedia International. (March)
-
SypherMedia International. Circuit Camouflage Technology - SMI IP Protection and Anti-Tamper Technologies. White Paper Version 1.9.8j (March 2012)
-
(2012)
White Paper Version 1.9.8j
-
-
|