Quantitative Analysis of Information Leakage Hardware Trojans in IP Cores

被引:0
|
作者
Zhang, Senjie [1 ,2 ]
Wang, Shuai [3 ]
Wang, Jinbo [2 ]
Zhou, Shan [2 ]
Yao, Zhaohui [4 ]
机构
[1] University of Chinese Academy of Sciences, Beijing, China
[2] Technology and Engineering Center for Space Utilization, Chinese Academy of Sciences, Beijing, China
[3] Astronaut Center of China, Beijing, China
[4] College of Energy and Power Engineering, Nanjing University of Aeronautics and Astronautics, Jiangsu, Nanjing, China
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Hardware security
引用
收藏
页码:431 / 436
相关论文
共 50 条
  • [21] Surviving Information Leakage Hardware Trojan Attacks Using Hardware Isolation
    Hu, Nianhang
    Ye, Mengmei
    Wei, Sheng
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2019, 7 (02) : 253 - 261
  • [22] A hardware Trojans design using the correlation analysis of electromagnetic emanation
    Zhang, Peng
    Zou, Cheng
    Deng, Gaoming
    Chen, Kaiyan
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2010, 38 (10): : 22 - 25
  • [23] Detecting Hardware Trojans with Gate-Level Information-Flow Tracking
    Hu, Wei
    Mao, Baolei
    Oberg, Jason
    Kastner, Ryan
    COMPUTER, 2016, 49 (08) : 44 - 52
  • [24] Smart Employment of Circuit Redundancy to Effectively Counter Trojans (SECRET) in Third-Party IP Cores
    Farag, Mohammed M.
    Ewais, Mohammad A.
    2014 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2014,
  • [25] HLIFT: A High-level Information Flow Tracking Method for Detecting Hardware Trojans
    Wang, Chenguang
    Cai, Yici
    Zhou, Qiang
    2018 23RD ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2018, : 727 - 732
  • [26] Analysis of Data-Leak Hardware Trojans in AES Cryptographic Circuits
    Reece, Trey
    Robinson, William H.
    2013 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2013, : 467 - 472
  • [27] Under the Dome: Preventing Hardware Timing Information Leakage
    Escouteloup, Mathieu
    Lashermes, Ronan
    Fournier, Jacques
    Lanet, Jean-Louis
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2021), 2022, 13173 : 233 - 253
  • [28] Sensitivity analysis to hardware Trojans using power supply transient signals
    Rad, Reza
    Plusquellic, Jim
    Tehranipoor, Mohammad
    2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, : 3 - +
  • [29] Qualitative and Quantitative Analysis of Information Leakage in Java']Java Source Code
    Chen, Bo
    Xu, Da-wei
    Yu, Ling
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 338 - 342
  • [30] The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs
    Knichel, David
    Moos, Thorben
    Moradi, Amir
    2020 IEEE EUROPEAN TEST SYMPOSIUM (ETS 2020), 2020,