System side-channel leakage emulation for HW/SW security coverification of MPSoCs
暂无分享,去创建一个
[1] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[2] Patrick Schaumont,et al. Early feedback on side-channel risks with accelerated toggle-counting , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[3] Christian Steger,et al. A side channel attack countermeasure using system-on-chip power profile scrambling , 2011, 2011 IEEE 17th International On-Line Testing Symposium.
[4] Roman Bartosiński,et al. The LEON3 Processor , 2013 .
[5] Alessandro Trifiletti,et al. Testing power-analysis attack susceptibility in register-transfer level designs , 2007, IET Inf. Secur..
[6] Makoto Nagata,et al. A fast power current analysis methodology using capacitor charging model for side channel attack evaluation , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[7] Patrick Schaumont,et al. A Component-Based Design Environment for ESL Design , 2006, IEEE Design & Test of Computers.
[8] Daniel Shumow,et al. Side Channel Leakage Profiling in Software , 2010 .
[9] Ingrid Verbauwhede,et al. Simulation models for side-channel information leaks , 2005, Proceedings. 42nd Design Automation Conference, 2005..
[10] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[11] Anantha P. Chandrakasan,et al. Low-power CMOS digital design , 1992 .
[12] Stéphane Badel,et al. A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions , 2009, CHES.
[13] Erik P. de Vink,et al. Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards , 2004, Formal Aspects in Security and Trust.
[14] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[15] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[16] Christian Steger,et al. Accelerating early design phase differential power analysis using power emulation techniques , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[17] Alessandro Trifiletti,et al. High-Level Side-Channel Attack Modeling and Simulation for Security-Critical Systems on Chips , 2008, IEEE Transactions on Dependable and Secure Computing.