Hardware Trojan Side-Channels based on Physical Unclonable Functions

Z. Gong, M.X. Makkes

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
2 Downloads (Pure)

Abstract

The separation design and fabrication process in the semiconductor industry leads to potential threats such as trojan side-channels (TSCs). In this paper we design a new family of TSCs from physical unclonable functions (PUFs). In particular, a dedicated attack on the PRESENT block cipher is described by using our PUF-based TSCs. Finally we analyze the performance of our PUF-based TSCs and discuss other potential applications.
Original languageEnglish
Title of host publicationInformation Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication (5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings)
EditorsC.A. Ardagna, J. Zhou
Place of PublicationBerlin
PublisherSpringer
Pages294-303
ISBN (Print)978-3-642-21039-6
DOIs
Publication statusPublished - 2011

Publication series

NameLecture Notes in Computer Science
Volume6633
ISSN (Print)0302-9743

Fingerprint Dive into the research topics of 'Hardware Trojan Side-Channels based on Physical Unclonable Functions'. Together they form a unique fingerprint.

Cite this