Side-channel trojan insertion - A practical foundry-side attack via ECO

被引:0
|
作者
Perez, Tiago Diadami [1 ]
Imran, Malik [1 ]
Vaz, Pablo [1 ]
Pagliarini, Samuel [1 ]
机构
[1] Department of Computer Systems, Tallinn University of Technology, Tallinn, Estonia
来源
arXiv | 2021年
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Hardware security
引用
收藏
相关论文
共 50 条
  • [1] Side-Channel Trojan Insertion - a Practical Foundry-Side Attack via ECO
    Perez, Tiago
    Imran, Malik
    Vaz, Pablo
    Pagliarini, Samuel
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [2] ThermalBleed: A Practical Thermal Side-Channel Attack
    Kim, Taehun
    Shin, Youngjoo
    IEEE ACCESS, 2022, 10 : 25718 - 25731
  • [3] Practical side-channel attack on a security device
    San Pedro, Manuel
    Servant, Victor
    Guillemet, Charles
    31ST INTERNATIONAL CONFERENCE ON MICROELECTRONICS (IEEE ICM 2019), 2019, : 130 - 133
  • [4] POSTER: Is Active Electromagnetic Side-channel Attack Practical?
    Wakabayashi, Satohiro
    Maruyama, Seita
    Mori, Tatsuya
    Goto, Shigeki
    Kinugawa, Masahiro
    Hayashi, Yu-ichi
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2587 - 2589
  • [5] Side-channel attack pitfalls
    Tiri, Kris
    2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 15 - 20
  • [6] Practical Side-Channel Attack on Message Encoding in Masked Kyber
    Wang, Jian
    Cao, Weigiong
    Chen, Hua
    Li, Haoyuan
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 882 - 889
  • [7] An Implementation of Trojan Side-Channel with a Masking Scheme
    Meng, Wenlin
    Zhu, Wenfeng
    Zhang, Chi
    Liu, Junrong
    Guo, Zheng
    Gu, Dawu
    Fan, Wei
    Zhang, Haifeng
    Yuan, Yidong
    2017 13TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2017, : 566 - 569
  • [8] The First Thorough Side-Channel Hardware Trojan
    Ender, Maik
    Ghandali, Samaneh
    Moradi, Amir
    Paar, Christof
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 : 755 - 780
  • [9] On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis
    Dupuis, Sophie
    Di Natale, Giorgio
    Flottes, Marie-Lise
    Rouzeyre, Bruno
    INFORMATION SECURITY JOURNAL, 2013, 22 (5-6): : 226 - 236
  • [10] Side-channel attack on substitution blocks
    Novak, R
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 307 - 318