Hardware Trojan Side-Channels based on Physical Unclonable Functions

Z. Gong, M.X. Makkes

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

5 Citaten (Scopus)
2 Downloads (Pure)

Samenvatting

The separation design and fabrication process in the semiconductor industry leads to potential threats such as trojan side-channels (TSCs). In this paper we design a new family of TSCs from physical unclonable functions (PUFs). In particular, a dedicated attack on the PRESENT block cipher is described by using our PUF-based TSCs. Finally we analyze the performance of our PUF-based TSCs and discuss other potential applications.
Originele taal-2Engels
TitelInformation Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication (5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings)
RedacteurenC.A. Ardagna, J. Zhou
Plaats van productieBerlin
UitgeverijSpringer
Pagina's294-303
ISBN van geprinte versie978-3-642-21039-6
DOI's
StatusGepubliceerd - 2011

Publicatie series

NaamLecture Notes in Computer Science
Volume6633
ISSN van geprinte versie0302-9743

Vingerafdruk

Duik in de onderzoeksthema's van 'Hardware Trojan Side-Channels based on Physical Unclonable Functions'. Samen vormen ze een unieke vingerafdruk.

Citeer dit