Hardware accelerated smart-card software evaluation supported by information leakage and activity sensors
暂无分享,去创建一个
Christian Steger | Reinhold Weiss | Armin Krieg | Johannes Grinschgl | Holger Bock | Josef Haid | Andreas Genser
[1] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[2] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[3] Anantha P. Chandrakasan,et al. Low-power CMOS digital design , 1992 .
[4] Daniel Shumow,et al. Side Channel Leakage Profiling in Software , 2010 .
[5] J. Grinschgl,et al. System side-channel leakage emulation for HW/SW security coverification of MPSoCs , 2012, 2012 IEEE 15th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS).
[6] Makoto Nagata,et al. A fast power current analysis methodology using capacitor charging model for side channel attack evaluation , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[7] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[8] Christian Steger,et al. Hardware-Accelerated Workload Characterization for Power Modeling and Fault Injection , 2012, 2012 IEEE 21st Asian Test Symposium.
[9] Christian Steger,et al. Automated Power Characterization for Run-Time Power Emulation of SoC Designs , 2010, 2010 13th Euromicro Conference on Digital System Design: Architectures, Methods and Tools.
[10] Stéphane Badel,et al. A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions , 2009, CHES.
[11] Alessandro Trifiletti,et al. Testing power-analysis attack susceptibility in register-transfer level designs , 2007, IET Inf. Secur..
[12] Patrick Schaumont,et al. Early feedback on side-channel risks with accelerated toggle-counting , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[13] Alessandro Trifiletti,et al. High-Level Side-Channel Attack Modeling and Simulation for Security-Critical Systems on Chips , 2008, IEEE Transactions on Dependable and Secure Computing.
[14] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[15] Trevor Mudge,et al. MiBench: A free, commercially representative embedded benchmark suite , 2001 .
[16] Ingrid Verbauwhede,et al. Simulation models for side-channel information leaks , 2005, Proceedings. 42nd Design Automation Conference, 2005..
[17] Patrick Schaumont,et al. A Component-Based Design Environment for ESL Design , 2006, IEEE Design & Test of Computers.
[18] Erik P. de Vink,et al. Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards , 2004, Formal Aspects in Security and Trust.