Hardware Trojan Side-Channels Based on Physical Unclonable Functions

被引:0
|
作者
Gong, Zheng [1 ]
Makkes, Marc X. [2 ]
机构
[1] South China Normal Univ, Sch Comp Sci, Guangzhou 510631, Guangdong, Peoples R China
[2] Eindhoven Univ Technol, Eindhoven, Netherlands
来源
INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION | 2011年 / 6633卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The separation design and fabrication process in the semiconductor industry leads to potential threats such as trojan side-channels (TSCs). In this paper we design a new family of TSCs from physical unclonable functions (PUFs). In particular, a dedicated attack on the PRESENT block cipher is described by using our PUF-based TSCs. Finally we analyze the performance of our PUF-based TSCs and discuss other potential applications.
引用
收藏
页码:294 / 303
页数:10
相关论文
共 50 条
  • [1] Hardware trojan side-channels based on physical unclonable functions
    Gong, Zheng
    Makkes, Marc X.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 6633 : 294 - 303
  • [2] Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering
    Lin, Lang
    Kasper, Markus
    Gueneysu, Tim
    Paar, Christof
    Burleson, Wayne
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 382 - +
  • [3] Hardware Trojan Detection employing Machine Learning, Physical Unclonable Functions and Side Channel Analysis
    Saraf, Muskan
    Syed, Talha Hussain
    Kulkarni, Akshay
    Niamat, Mohammed
    IEEE International Conference on Electro Information Technology, 2024, : 514 - 519
  • [4] Hardware Trojan Detection employing Machine Learning, Physical Unclonable Functions and Side Channel Analysis
    Saraf, Muskan
    Syed, Talha Hussain
    Kulkarni, Akshay
    Niamat, Mohammed
    2024 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY, EIT 2024, 2024, : 514 - 519
  • [5] Efficient Power and Timing Side Channels for Physical Unclonable Functions
    Ruehrmair, Ulrich
    Xu, Xiaolin
    Soelter, Jan
    Mahmoud, Ahmed
    Majzoobi, Mehrdad
    Koushanfar, Farinaz
    Burleson, Wayne
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014, 2014, 8731 : 476 - 492
  • [6] Efficient power and timing side channels for physical unclonable functions
    Rührmair, Ulrich
    Xu, Xiaolin
    Sölter, Jan
    Mahmoud, Ahmed
    Majzoobi, Mehrdad
    Koushanfar, Farinaz
    Burleson, Wayne
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 : 476 - 492
  • [7] Trained to Leak: Hiding Trojan Side-Channels in Neural Network Weights
    Meyers, Vincent
    Hefenbrock, Michael
    Gnad, Dennis
    Tahoori, Mehdi
    2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 122 - 127
  • [8] HT-EMIS: A Deep Learning Tool for Hardware Trojan Detection and Identification through Runtime EM Side-Channels
    Wang, Hanqiu
    Panoff, Maximilian Kealoha
    PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2023, GLSVLSI 2023, 2023, : 51 - 56
  • [9] Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels
    Wei, Sheng
    Wendt, James B.
    Nahapetian, Ani
    Potkonjak, Miodrag
    2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
  • [10] A Taxonomy of Side-Channels
    Clark, Tristan
    McDonald, Jeffrey T.
    Andel, Todd R.
    Baggett, Brandon
    Mullens, Tristen
    SOUTHEASTCON 2024, 2024, : 1564 - 1570