Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs
暂无分享,去创建一个
Jean-Pierre Seifert | Shahin Tajik | Heiko Lohrke | Christian Boit | Thilo Krachenfels | J. Seifert | C. Boit | H. Lohrke | S. Tajik | Thilo Krachenfels | Jean-Pierre Seifert | Heiko Lohrke | Shahin Tajik
[1] Sergei P. Skorobogatov. Optically Enhanced Position-Locked Power Analysis , 2006, CHES.
[2] Jean-Pierre Seifert,et al. On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs , 2017, CCS.
[3] N. Otsu. A threshold selection method from gray level histograms , 1979 .
[4] Stephen M. Trimberger,et al. FPGA Security: Motivations, Features, and Applications , 2014, Proceedings of the IEEE.
[5] Min Cao,et al. A 20nm 112Mb SRAM in High-к metal-gate with assist circuitry for low-leakage and low-VMIN applications , 2013, 2013 IEEE International Solid-State Circuits Conference Digest of Technical Papers.
[6] Ross J. Anderson,et al. On a new way to read data from memory , 2002, First International IEEE Security in Storage Workshop, 2002. Proceedings..
[7] Elham Amini,et al. STUDENT PAPER: Backside Protection Structure for Security Sensitive ICs , 2017 .
[8] Christian Boit,et al. Ultra high precision circuit diagnosis through seebeck generation and charge monitoring , 2013, Proceedings of the 20th IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA).
[9] Christof Paar,et al. Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix II and Stratix III FPGAs , 2015, TRETS.
[10] Stephan Saalfeld,et al. Globally optimal stitching of tiled 3D microscopic image acquisitions , 2009, Bioinform..
[11] Johannes E. Schindelin,et al. Fiji: an open-source platform for biological-image analysis , 2012, Nature Methods.
[12] Philippe Perdu,et al. Implementing Thermal Laser and Photoelectric Laser Stimulation in a failure analysis laboratory , 2003, Proceedings of the 10th International Symposium on the Physical and Failure Analysis of Integrated Circuits. IPFA 2003.
[13] Jean-Pierre Seifert,et al. Invasive PUF Analysis , 2013, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[14] Matthijs C. Dorst. Distinctive Image Features from Scale-Invariant Keypoints , 2011 .
[15] Amir Moradi,et al. Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series , 2016, COSADE.
[16] Ujjwal Guin,et al. Invasion of the hardware snatchers , 2017, IEEE Spectrum.
[17] Jean-Pierre Seifert,et al. PUFMon: Security monitoring of FPGAs using physically unclonable functions , 2017, 2017 IEEE 23rd International Symposium on On-Line Testing and Robust System Design (IOLTS).