Hardware Trojan Side-Channels Based on Physical Unclonable Functions

被引:0
|
作者
Gong, Zheng [1 ]
Makkes, Marc X. [2 ]
机构
[1] South China Normal Univ, Sch Comp Sci, Guangzhou 510631, Guangdong, Peoples R China
[2] Eindhoven Univ Technol, Eindhoven, Netherlands
来源
INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION | 2011年 / 6633卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The separation design and fabrication process in the semiconductor industry leads to potential threats such as trojan side-channels (TSCs). In this paper we design a new family of TSCs from physical unclonable functions (PUFs). In particular, a dedicated attack on the PRESENT block cipher is described by using our PUF-based TSCs. Finally we analyze the performance of our PUF-based TSCs and discuss other potential applications.
引用
收藏
页码:294 / 303
页数:10
相关论文
共 50 条
  • [31] PUFSec: Protecting Physical Unclonable Functions Using Hardware Isolation-based System Security Techniques
    Ye, Mengmei
    Shahrak, Mehrdad Zaker
    Wei, Sheng
    PROCEEDINGS OF THE 2017 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2017, : 7 - 12
  • [32] Design of a reliable current starved inverter based arbiter physical unclonable functions (PUFs) for hardware cryptography
    Kurra A.K.
    Nelakuditi U.R.
    Ingenierie des Systemes d'Information, 2019, 24 (04): : 445 - 454
  • [33] Hardware Trojan Horse Device based on Unintended USB Channels
    Clark, John
    Leblanc, Sylvain
    Knight, Scott
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 1 - 8
  • [34] Delay based Physical Unclonable Function for Hardware Security and Trust
    Sahithi, Kolasani
    Murty, N. S.
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 797 - 803
  • [35] OBELIX: Mitigating Side-Channels Through Dynamic Obfuscation
    Wichelmann, Jan
    Rabich, Anja
    Paetschke, Anna
    Eisenbarth, Thomas
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 4182 - 4199
  • [36] Scheduler-based Defenses against Cross-VM Side-channels
    Varadarajan, Venkatanathan
    Ristenpart, Thomas
    Swift, Michael
    PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, 2014, : 687 - 702
  • [37] On (in)Security of Edge-based Machine Learning Against Electromagnetic Side-channels
    Bhasin, Shivam
    Jap, Dirmanto
    Picek, Stjepan
    2022 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY & SIGNAL/POWER INTEGRITY, EMCSI, 2022, : 262 - 267
  • [38] Extraction and Validation of Algorithms from Analog Side-Channels
    Riley, Ronald A.
    Graham, James T.
    Fuller, Ryan M.
    Baldwin, Rusty O.
    Sampathkumar, Ashwin
    CYBER SENSING 2017, 2017, 10185
  • [39] Combined side-channels malware detection for NFV infrastructure
    Sergeev, Andrew
    ben-Sa'adon, Eyal
    Tannenbaum, Elad
    Saar, Asi
    THIRD CENTRAL EUROPEAN CYBERSECURITY CONFERENCE (CECC 2019), 2019,
  • [40] Physical Unclonable Functions based on Carbon Nanotube FETs
    Moradi, Mona
    Tao, Sha
    Mirzaee, Reza Faghih
    2017 IEEE 47TH INTERNATIONAL SYMPOSIUM ON MULTIPLE-VALUED LOGIC (ISMVL 2017), 2017, : 124 - 129