메뉴 건너뛰기




Volumn 8086 LNCS, Issue , 2013, Pages 197-214

Stealthy dopant-level hardware trojans

Author keywords

Hardware trojans; Layout modifications; Malicious hardware; Trojan side channel

Indexed keywords

EMBEDDED SYSTEMS; INTEGRATED CIRCUIT DESIGN; MALWARE; MILITARY APPLICATIONS; SIDE CHANNEL ATTACK;

EID: 84890588314     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-40349-1_12     Document Type: Conference Paper
Times cited : (217)

References (25)
  • 2
    • 35048818034 scopus 로고    scopus 로고
    • Correlation power analysis with a leakage model
    • In: Joye, M., Quisquater, J.-J. (eds.) LNCS, Springer, Heidelberg
    • Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29. Springer, Heidelberg (2004)
    • (2004) CHES 2004 , vol.3156 , pp. 16-29
    • Brier, E.1    Clavier, C.2    Olivier, F.3
  • 3
    • 27244440344 scopus 로고    scopus 로고
    • A very compact S-box for AES
    • In: Rao, J.R., Sunar, B. (eds.) LNCS, Springer, Heidelberg
    • Canright, D.: A very compact S-box for AES. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 441-455. Springer, Heidelberg (2005)
    • (2005) CHES 2005 , vol.3659 , pp. 441-455
    • Canright, D.1
  • 5
    • 51049117070 scopus 로고    scopus 로고
    • Mutual information analysis
    • In: Oswald, E., Rohatgi, P. (eds.) LNCS, Springer, Heidelberg
    • Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual Information Analysis. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 426-442. Springer, Heidelberg (2008)
    • (2008) CHES 2008 , vol.5154 , pp. 426-442
    • Gierlichs, B.1    Batina, L.2    Tuyls, P.3    Preneel, B.4
  • 6
    • 84861728017 scopus 로고    scopus 로고
    • Counterfeit chips on the rise
    • Gorman, C.: Counterfeit chips on the rise. IEEE Spectrum 49(6), 16-17 (2012)
    • (2012) IEEE Spectrum , vol.49 , Issue.6 , pp. 16-17
    • Gorman, C.1
  • 7
    • 84881229522 scopus 로고    scopus 로고
    • Analysis of intel's ivy bridge digital random number generator
    • Cryptography Research INC. (March)
    • Hamburg, M., Kocher, P., Marson, M.E.: Analysis of Intel's Ivy Bridge Digital Random Number Generator. Technical Report, Cryptography Research INC. (March 2012)
    • (2012) Technical Report
    • Hamburg, M.1    Kocher, P.2    Marson, M.E.3
  • 12
    • 70449730263 scopus 로고    scopus 로고
    • Trojan side-channels: Lightweight hardware trojans through side-channel engineering
    • In: Clavier, C., Gaj, K. (eds.) LNCS, Springer, Heidelberg
    • Lin, L., Kasper, M., Güneysu, T., Paar, C., Burleson, W.: Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 382-395. Springer, Heidelberg (2009)
    • (2009) CHES 2009 , vol.5747 , pp. 382-395
    • Lin, L.1    Kasper, M.2    Güneysu, T.3    Paar, C.4    Burleson, W.5
  • 15
    • 84871098932 scopus 로고    scopus 로고
    • Nangate Inc. version PDKv1 3 v2010 12 (August.)
    • Nangate Inc. Nangate Open Cell Library, version PDKv1 3 v2010 12 (August. 2011), http://www.si2.org/openeda.si2.org/projects/nangatelib
    • (2011) Nangate Open Cell Library
  • 16
    • 38049043381 scopus 로고    scopus 로고
    • Evaluation of the masked logic style MDPL on a prototype chip
    • In: Paillier, P., Verbauwhede, I. (eds.) LNCS, Springer, Heidelberg
    • Popp, T., Kirschbaum, M., Zefferer, T., Mangard, S.: Evaluation of the Masked Logic Style MDPL on a Prototype Chip. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 81-94. Springer, Heidelberg (2007)
    • (2007) CHES 2007 , vol.4727 , pp. 81-94
    • Popp, T.1    Kirschbaum, M.2    Zefferer, T.3    Mangard, S.4
  • 17
    • 27244451515 scopus 로고    scopus 로고
    • Masked dual-rail pre-charge logic: DPA-resistance without routing constraints
    • In: Rao, J.R., Sunar, B. (eds.) LNCS, Springer, Heidelberg
    • Popp, T., Mangard, S.: Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 172-186. Springer, Heidelberg (2005)
    • (2005) CHES 2005 , vol.3659 , pp. 172-186
    • Popp, T.1    Mangard, S.2
  • 22
    • 84890620790 scopus 로고    scopus 로고
    • Circuit camouflage technology - SMI IP protection and anti-tamper technologies
    • SypherMedia International. (March)
    • SypherMedia International. Circuit Camouflage Technology - SMI IP Protection and Anti-Tamper Technologies. White Paper Version 1.9.8j (March 2012)
    • (2012) White Paper Version 1.9.8j


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.