Search Results - "2012 IEEE International Symposium on Hardware-Oriented Security and Trust"
-
1
Performance metrics and empirical results of a PUF cryptographic key generation ASIC
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…We describe a PUF design with integrated error correction that is robust to various layout implementations and achieves excellent and consistent results in…”
Get full text
Conference Proceeding -
2
Reliability enhancement of bi-stable PUFs in 65nm bulk CMOS
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…We demonstrate the efficacy and associated costs of three reliability enhancing techniques for bi-stable PUF designs (SRAM and sense amplifier-based) -…”
Get full text
Conference Proceeding -
3
Reverse engineering circuits using behavioral pattern mining
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…Systems are increasingly being constructed from off-the-shelf components acquired through a globally distributed, untrusted supply chain. The lack of trust in…”
Get full text
Conference Proceeding -
4
Complementary IBS: Application specific error correction for PUFs
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…In this contribution, we present Complementary Index-Based Syndrome coding (C-IBS), a new and flexible fuzzy embedder for Physical Unclonable Functions (PUFs)…”
Get full text
Conference Proceeding -
5
Evaluating security requirements in a general-purpose processor by combining assertion checkers with code coverage
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…The problem of malicious inclusions in hardware is an emerging threat, and detecting them is a difficult challenge. In this research, we enhance an existing…”
Get full text
Conference Proceeding -
6
Trojan detection based on delay variations measured using a high-precision, low-overhead embedded test structure
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…The horizontal dissemination of the chip fabrication industry has raised new concerns over Integrated Circuit (IC) Trust, in particular, the threat of…”
Get full text
Conference Proceeding -
7
A novel method for watermarking sequential circuits
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…We propose a novel technique to watermark sequential circuits by embedding a signature via state encoding. The proposed technique is a greedy heuristic for the…”
Get full text
Conference Proceeding -
8
HTOutlier: Hardware Trojan detection with side-channel signature outlier identification
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…Hardware Trojan (HT) is a growing concern for the semiconductor industry. As a non-invasive and inexpensive approach, side-channel analysis methods based on…”
Get full text
Conference Proceeding -
9
SDMLp: On the use of complementary Pass transistor Logic for design of DPA resistant circuits
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…The emergence and proliferation of Smart Cards and other security-centric technologies require ongoing advancement in secure-IC design. We propose advanced IC…”
Get full text
Conference Proceeding -
10
Functional integrated circuit analysis
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…This work introduces a novel, automated methodology for performing functional analysis of integrated circuits (ICs), such as microcontrollers and smart cards…”
Get full text
Conference Proceeding -
11
Improved algebraic side-channel attack on AES
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…In this paper we present improvements of the algebraic side-channel analysis of the Advanced Encryption Standard (AES) proposed in [1]. In particular, we…”
Get full text
Conference Proceeding -
12
Glitch-free implementation of masking in modern FPGAs
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…Due to the propagation of the glitches in combinational circuits side-channel leakage of the masked S-boxes realized in hardware is a known issue. Our…”
Get full text
Conference Proceeding -
13
Detection of probing attempts in secure ICs
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…Physical attacks focus on extracting information from internal parts of IC's. One way to achieve this is by means of connecting probes to wires, so that the…”
Get full text
Conference Proceeding -
14
HSDL: A Security Development Lifecycle for hardware technologies
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…Security assurance is a rapidly evolving but well understood discipline in the software industry. Many firms have adopted the Security Development Lifecycle as…”
Get full text
Conference Proceeding -
15
t-Private logic synthesis on FPGAs
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…A t-private circuit reveals no information about any internal logic node with up to t probes each cycle. In this paper, we propose efficient t-private logic…”
Get full text
Conference Proceeding -
16
Design solutions for securing SRAM cell against power analysis
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…Side channel attacks exploit physical imperfections of hardware to circumvent security features achieved by mathematically secure protocols and algorithms…”
Get full text
Conference Proceeding -
17
Buskeeper PUFs, a promising alternative to D Flip-Flop PUFs
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…Cloning, theft of service and tampering have become serious threats on the revenue and reputation of hardware vendors. To protect their products against these…”
Get full text
Conference Proceeding -
18
Fault Round Modification Analysis of the advanced encryption standard
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…This paper describes a new physical analysis technique based on changing the number of the AES rounds. It is an extension of the already known Round Reduction…”
Get full text
Conference Proceeding -
19
On charge sensors for FIB attack detection
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…A new sensor of Focused Ion Beam (FIB) attacks on security sensitive ICs is presented. The function is based on the FIB navigation process mandatory for FIB…”
Get full text
Conference Proceeding -
20
Interacting with Hardware Trojans over a network
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…Hardware Trojan horses (HTHs) are emerging threats to integrated circuits (ICs) outsourced to a global supply chain or developed with untrusted tools and…”
Get full text
Conference Proceeding