Hardware Trojan Side-Channels Based on Physical Unclonable Functions - Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication
Conference Papers Year : 2011

Hardware Trojan Side-Channels Based on Physical Unclonable Functions

Abstract

The separation design and fabrication process in the semiconductor industry leads to potential threats such as trojan side-channels (TSCs). In this paper we design a new family of TSCs from physical unclonable functions (PUFs). In particular, a dedicated attack on the PRESENT block cipher is described by using our PUF-based TSCs. Finally we analyze the performance of our PUF-based TSCs and discuss other potential applications.
Fichier principal
Vignette du fichier
978-3-642-21040-2_21_Chapter.pdf (166.74 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-01573309 , version 1 (09-08-2017)

Licence

Identifiers

Cite

Zheng Gong, Marc X. Makkes. Hardware Trojan Side-Channels Based on Physical Unclonable Functions. 5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.294-303, ⟨10.1007/978-3-642-21040-2_21⟩. ⟨hal-01573309⟩
179 View
93 Download

Altmetric

Share

More