Hacking and protecting IC hardware
暂无分享,去创建一个
Mark Mohammad Tehranipoor | Giorgio Di Natale | Jean-Luc Danger | Said Hamdioui | Fethulah Smailbegovic | Gerard van Battum
[1] B. Hamilton,et al. Integrated Circuit Security Threats and Hardware Assurance Countermeasures , 2013 .
[2] Sue Kinn,et al. Introduction to the hardware , 1998 .
[3] Sylvain Guilley,et al. Fault Injection Resilience , 2010, 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[4] Mark G. Karpovsky,et al. Comparative Analysis of Robust Fault Attack Resistant Architectures for Public and Private Cryptosystems , 2008, 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography.
[5] Jie Li,et al. At-speed delay characterization for IC authentication and Trojan Horse detection , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[6] Mark Mohammad Tehranipoor,et al. Design of On-Chip Lightweight Sensors for Effective Detection of Recycled ICs , 2014, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[7] Catherine H. Gebotys,et al. Enhanced Current-Balanced Logic (ECBL): An Area Efficient Solution to Secure Smart Cards against Differential Power Attack , 2007, Fourth International Conference on Information Technology (ITNG'07).
[8] Ingrid Verbauwhede,et al. The Fault Attack Jungle - A Classification Model to Guide You , 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[9] Yuanyuan Zhou,et al. Designing and Implementing Malicious Hardware , 2008, LEET.
[10] Sergei Skorobogatov,et al. Semi-invasive attacks: a new approach to hardware security analysis , 2005 .
[11] Ingrid Verbauwhede,et al. Low-cost fault detection method for ECC using Montgomery powering ladder , 2011, 2011 Design, Automation & Test in Europe.
[12] Ingrid Verbauwhede,et al. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[13] Frank K. Gürkaynak. GALS system design: side channel attack secure cryptographic accelerators , 2006 .
[14] Mark Mohammad Tehranipoor,et al. Secure Split-Test for preventing IC piracy by untrusted foundry and assembly , 2013, 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS).
[15] Giorgio Di Natale,et al. A Reliable Architecture for Parallel Implementations of the Advanced Encryption Standard , 2009, J. Electron. Test..
[16] Christophe Clavier,et al. Passive and Active Combined Attacks on AES Combining Fault Attacks and Side Channel Analysis , 2007, 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[17] G. Edward Suh,et al. Hardware authentication leveraging performance limits in detailed simulations and emulations , 2009, 2009 46th ACM/IEEE Design Automation Conference.
[18] Gang Qu,et al. Hardware metering , 2001, Proceedings of the 38th Design Automation Conference (IEEE Cat. No.01CH37232).
[19] Simha Sethumadhavan,et al. Silencing Hardware Backdoors , 2011, 2011 IEEE Symposium on Security and Privacy.
[20] Christof Paar,et al. Stealthy dopant-level hardware Trojans: extended version , 2013, Journal of Cryptographic Engineering.
[21] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[22] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[23] Gerhard P. Hancke. Noisy Carrier Modulation for HF RFID , 2007 .
[24] Mark Mohammad Tehranipoor,et al. Identification of recovered ICs using fingerprints from a light-weight on-chip sensor , 2012, DAC Design Automation Conference 2012.
[25] Benoit Feix,et al. Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis , 2007, Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007).
[26] Cliff Wang,et al. Introduction to Hardware Security and Trust , 2011 .
[27] Y. Zhang,et al. Security wrappers and power analysis for SoC technology , 2003, First IEEE/ACM/IFIP International Conference on Hardware/ Software Codesign and Systems Synthesis (IEEE Cat. No.03TH8721).
[28] Agustin Dominguez-Oviedo,et al. On Fault-based Attacks and Countermeasures for Elliptic Curve Cryptosystems , 2008 .
[29] Nevine Maurice Ebeid,et al. Securing the Elliptic Curve Montgomery Ladder against Fault Attacks , 2009, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).
[30] Israel Koren,et al. Workshop on fault diagnosis and tolerance in cryptography , 2004, International Conference on Dependable Systems and Networks, 2004.
[31] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[32] Giorgio Di Natale,et al. Novel transient-fault detection circuit featuring enhanced bulk built-in current sensor with low-power sleep-mode , 2012, Microelectron. Reliab..
[33] Marc Joye,et al. Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults , 2005, Des. Codes Cryptogr..
[34] Mark Mohammad Tehranipoor,et al. Detecting malicious inclusions in secure hardware: Challenges and solutions , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[35] KoushanfarFarinaz,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010 .
[36] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[37] Stefan Mangard. Keeping Secrets on Low-Cost Chips , 2013, IEEE Security & Privacy.
[38] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[39] Yiorgos Makris,et al. Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[40] Berk Sunar,et al. Tate Pairing with Strong Fault Resiliency , 2007, Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007).
[41] Virginia Chanley,et al. DOD Supply Chain: Suspect Counterfeit Electronic Parts Can Be Found on Internet Purchasing Platforms , 2012 .