Quantitative Analysis of Information Leakage Hardware Trojans in IP Cores

被引:0
|
作者
Zhang, Senjie [1 ,2 ]
Wang, Shuai [3 ]
Wang, Jinbo [2 ]
Zhou, Shan [2 ]
Yao, Zhaohui [4 ]
机构
[1] University of Chinese Academy of Sciences, Beijing, China
[2] Technology and Engineering Center for Space Utilization, Chinese Academy of Sciences, Beijing, China
[3] Astronaut Center of China, Beijing, China
[4] College of Energy and Power Engineering, Nanjing University of Aeronautics and Astronautics, Jiangsu, Nanjing, China
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Hardware security
引用
收藏
页码:431 / 436
相关论文
共 50 条
  • [1] Range of Information Leakage from IoT Devices with Hardware Trojans
    Kinugawa, Masahiro
    Hayashi, Yu-ichi
    2018 JOINT IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY AND 2018 IEEE ASIA-PACIFIC SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC/APEMC), 2018, : 118 - 118
  • [2] Hardware Trojans Inspired IP Watermarks
    Shayan, Mohammed
    Basu, Kanad
    Karri, Ramesh
    IEEE DESIGN & TEST, 2019, 36 (06) : 72 - 79
  • [3] A Novel Tampering Attack on AES Cores with Hardware Trojans
    Jain, Ayush
    Guin, Ujjwal
    2020 IEEE INTERNATIONAL TEST CONFERENCE IN ASIA (ITC-ASIA 2020), 2020, : 77 - 82
  • [4] HarTBleed: Using Hardware Trojans for Data Leakage Exploits
    De, Asmit
    Khan, Mohammad Nasim Imtiaz
    Nagarajan, Karthikeyan
    Ghosh, Swaroop
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2020, 28 (04) : 968 - 979
  • [5] Preventing Soft Errors and Hardware Trojans in RISC-V Cores
    University of Twente, Enschede, Netherlands
    不详
    不详
    不详
    不详
    Proc. IEEE Int. Symp. Defect Fault Toler. VLSI Nanotechnol. Syst., DFT,
  • [6] Designing and implementing hardware Trojans in ARM9 IP
    Zhen, Li
    Lei, Li
    Feng, Wenfeng
    Lei, Fang
    Zhao, Zhiqiang
    2013 International Conference on Communications, Circuits and Systems, ICCCAS 2013, 2013, 2 : 524 - 527
  • [7] Hardware Trojan Horses in Cryptographic IP Cores
    Bhasin, Shivam
    Danger, Jean-Luc
    Guilley, Sylvain
    Xuan Thuy Ngo
    Sauvage, Laurent
    2013 10TH WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2013), 2013, : 15 - 29
  • [8] A Benchmark Suite of RT-level Hardware Trojans for Pipelined Microprocessor Cores
    Damljanovic, Aleksa
    Ruospo, Annachiara
    Sanchez, Ernesto
    Squillero, Giovanni
    2021 24TH INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS & SYSTEMS (DDECS), 2021, : 51 - 56
  • [9] Design and analysis of hardware Trojans in approximate circuits
    Dou, Yuqin
    Wang, Chenghua
    Gu, Chongyan
    O'Neill, Maire
    Liu, Weiqiang
    ELECTRONICS LETTERS, 2022, 58 (05) : 197 - 199
  • [10] Propelling Innovation to Defeat Data-Leakage Hardware Trojans: From Theory to Practice
    Kwiat, Kevin
    Kulick, Jason
    Ratazzi, Paul
    arXiv,