Hardware Trojan Side-Channels Based on Physical Unclonable Functions

被引:0
作者
Gong, Zheng [1 ]
Makkes, Marc X. [2 ]
机构
[1] South China Normal Univ, Sch Comp Sci, Guangzhou 510631, Guangdong, Peoples R China
[2] Eindhoven Univ Technol, Eindhoven, Netherlands
来源
INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION | 2011年 / 6633卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The separation design and fabrication process in the semiconductor industry leads to potential threats such as trojan side-channels (TSCs). In this paper we design a new family of TSCs from physical unclonable functions (PUFs). In particular, a dedicated attack on the PRESENT block cipher is described by using our PUF-based TSCs. Finally we analyze the performance of our PUF-based TSCs and discuss other potential applications.
引用
收藏
页码:294 / 303
页数:10
相关论文
共 50 条
  • [21] BRB: Mitigating Branch Predictor Side-Channels
    Vougioukas, Ilias
    Nikoleris, Nikos
    Sandberg, Andreas
    Diestelhorst, Stephan
    Al-Hashimi, Bashir M.
    Merrett, Geoff V.
    2019 25TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA), 2019, : 466 - 477
  • [22] SoCs security: a war against side-channels
    Guilley, S
    Pacalet, R
    ANNALS OF TELECOMMUNICATIONS, 2004, 59 (7-8) : 998 - 1009
  • [23] Physical unclonable functions
    Yansong Gao
    Said F. Al-Sarawi
    Derek Abbott
    Nature Electronics, 2020, 3 : 81 - 91
  • [24] Domain-Agnostic Representation of Side-Channels
    Spence, Aaron
    Bangay, Shaun
    ENTROPY, 2024, 26 (08)
  • [25] Oblivious Transfer Based on Physical Unclonable Functions
    Ruhrmair, Ulrich
    TRUST AND TRUSTWORTHY COMPUTING, PROCEEDINGS, 2010, 6101 : 430 - 440
  • [26] Chaos-Based Physical Unclonable Functions
    Golofit, Krzysztof
    Wieczorek, Piotr Z.
    APPLIED SCIENCES-BASEL, 2019, 9 (05):
  • [27] Physical unclonable functions
    Gao, Yansong
    Al-Sarawi, Said F.
    Abbott, Derek
    NATURE ELECTRONICS, 2020, 3 (02) : 81 - 91
  • [28] Evaluation of (power) side-channels in cryptographic implementations
    Bache, Florian
    Plump, Christina
    Wloka, Jonas
    Gueneysu, Tim
    Drechsler, Rolf
    IT-INFORMATION TECHNOLOGY, 2019, 61 (01): : 15 - 28
  • [29] Guard Cache: Creating Noisy Side-Channels
    Mosquera, Fernando
    Kavi, Krishna
    Mehta, Gayatri
    John, Lizy
    IEEE COMPUTER ARCHITECTURE LETTERS, 2023, 22 (02) : 97 - 100
  • [30] Experiences In Side Channel and Testing Based Hardware Trojan Detection
    Hely, David
    Martin, Julien
    Triana, Gerson Dario Piraquive
    Mounier, Simon Piroux
    Riviere, Elie
    Sahuc, Thibault
    Savonet, Jeremy
    Soundararadjou, Laura
    2013 IEEE 31ST VLSI TEST SYMPOSIUM (VTS), 2013,