Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking

[1]  Mark Mohammad Tehranipoor,et al.  Detecting malicious inclusions in secure hardware: Challenges and solutions , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[2]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[3]  P. Maurine,et al.  Evaluation of countermeasures against electromagnetic analysis , 2009, 2009 International Symposium on Electromagnetic Compatibility - EMC Europe.

[4]  Wim van Eck,et al.  Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..

[5]  Tim Güneysu,et al.  Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering , 2009, CHES.

[6]  Andrey Bogdanov,et al.  PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.

[7]  William Zhu,et al.  Algorithms to Watermark Software Through Register Allocation , 2005, DRMTICS.

[8]  I. Markov,et al.  Designing Chips that Protect Themselves , 2010 .

[9]  Peng Zhang,et al.  The Power of Electromagnetic Analysis on Embedded Cryptographic Ics , 2008, 2008 International Conference on Embedded Software and Systems Symposia.

[10]  Jean-Jacques Quisquater,et al.  ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.

[11]  Yiorgos Makris,et al.  Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[12]  Mark Mohammad Tehranipoor,et al.  Trustworthy Hardware: Identifying and Classifying Hardware Trojans , 2010, Computer.

[13]  Christof Paar,et al.  Side-Channel based Watermarks for IP Protection , 2010 .

[14]  Christof Paar,et al.  Side-channel based watermarks for integrated circuits , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[15]  Francis Olivier,et al.  Electromagnetic Analysis: Concrete Results , 2001, CHES.

[16]  Michael Stepp,et al.  More on graph theoretic software watermarks: Implementation, analysis, and attacks , 2009, Inf. Softw. Technol..

[17]  Hervé Chabanne,et al.  Electromagnetic Side Channels of an FPGA Implementation of AES , 2004, IACR Cryptol. ePrint Arch..

[18]  Sebastian Danicic,et al.  An Evaluation of Static Java Bytecode Watermarking , 2010 .

[19]  B. Preneel,et al.  Differential Electromagnetic Attack on an FPGA Implementation of Elliptic Curve Cryptosystems , 2006, 2006 World Automation Congress.

[20]  Christof Paar,et al.  Security on FPGAs: State-of-the-art implementations and attacks , 2004, TECS.

[21]  Wayne P. Burleson,et al.  Implementing hardware Trojans: Experiences from a hardware Trojan challenge , 2011, 2011 IEEE 29th International Conference on Computer Design (ICCD).

[22]  Dakshi Agrawal,et al.  Multi-channel Attacks , 2003, CHES.

[23]  Christof Paar,et al.  Physical Cryptanalysis of KeeLoq Code Hopping Applications , 2008, IACR Cryptol. ePrint Arch..

[24]  Ken Eguro,et al.  FPGA side-channel receivers , 2011, FPGA '11.

[25]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[26]  C. D. Walter,et al.  Distinguishing Exponent Digits by Observing Modular Subtractions , 2001, CT-RSA.

[27]  Miodrag Potkonjak,et al.  Intellectual Property Metering , 2001, Information Hiding.

[28]  Pankaj Rohatgi,et al.  Template Attacks , 2002, CHES.

[29]  Christof Paar,et al.  Side-channel watermarks for embedded software , 2011, 2011 IEEE 9th International New Circuits and systems conference.