Hardware Trojan Side-Channels based on Physical Unclonable Functions

Z. Gong, M.X. Makkes

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)
2 Downloads (Pure)


The separation design and fabrication process in the semiconductor industry leads to potential threats such as trojan side-channels (TSCs). In this paper we design a new family of TSCs from physical unclonable functions (PUFs). In particular, a dedicated attack on the PRESENT block cipher is described by using our PUF-based TSCs. Finally we analyze the performance of our PUF-based TSCs and discuss other potential applications.
Original languageEnglish
Title of host publicationInformation Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication (5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings)
EditorsC.A. Ardagna, J. Zhou
Place of PublicationBerlin
ISBN (Print)978-3-642-21039-6
Publication statusPublished - 2011

Publication series

NameLecture Notes in Computer Science
ISSN (Print)0302-9743


Dive into the research topics of 'Hardware Trojan Side-Channels based on Physical Unclonable Functions'. Together they form a unique fingerprint.

Cite this