[2010] Avoiding Side-Channel Attacks in Embedded Systems with Non-deterministic Branches
暂无分享,去创建一个
Pedro Malagón | José Manuel Moya | Marina Zapater | Juan-Mariano de Goyeneche | M. Zapater | P. Malagón | Jose M. Moya
[1] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[2] Pedro Malagón,et al. SORU: A Reconfigurable Vector Unit for Adaptable Embedded Systems , 2009, ARC.
[3] Ingrid Verbauwhede,et al. Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology , 2003, CHES.
[4] Brian Bailey. System Level Virtual Prototyping becomes a reality with OVP donation from Imperas. , 2008 .
[5] Christof Paar,et al. Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed , 2009, AFRICACRYPT.
[6] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[7] Narayanan Vijaykrishnan,et al. Multiple access caches: Energy implications , 2000, Proceedings IEEE Computer Society Workshop on VLSI 2000. System Design for a System-on-Chip Era.
[8] David Brumley,et al. Remote timing attacks are practical , 2003, Comput. Networks.
[9] Zhimin Chen,et al. Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage , 2006, CHES.
[10] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[11] Alexandre Yakovlev,et al. Design and analysis of dual-rail circuits for security applications , 2005, IEEE Transactions on Computers.
[12] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[13] Peixin Zhong,et al. Energy macro-modeling of embedded microprocessor using SystemC , 2005, 2005 IEEE International Conference on Electro Information Technology.
[14] Daisuke Suzuki,et al. Random Switching Logic: A New Countermeasure against DPA and Second-Order DPA at the Logic Level , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[15] Ingrid Verbauwhede,et al. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[16] Christof Paar,et al. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme , 2008, CRYPTO.
[17] Christof Paar,et al. A Stochastic Model for Differential Side Channel Cryptanalysis , 2005, CHES.
[18] Stefan Mangard,et al. An AES Smart Card Implementation Resistant to Power Analysis Attacks , 2006, ACNS.
[19] David R. Kaeli,et al. Power Aware External Bus Arbitration for System-on-a-Chip Embedded Systems , 2005, HiPEAC.
[20] Stefan Mangard,et al. Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints , 2005, CHES.
[21] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[22] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[23] Johann Großschädl,et al. Non-deterministic processors: FPGA-based analysis of area, performance and security , 2009, WESS '09.
[24] Koen De Bosschere,et al. Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors , 2009, 2009 30th IEEE Symposium on Security and Privacy.