User menu

Private Circuits III: Hardware Trojan-Resilience via Testing Amplification

Bibliographic reference Dziembowski, Stefan ; Faust, Sebastian ; Standaert, François-Xavier. Private Circuits III: Hardware Trojan-Resilience via Testing Amplification.23rd ACM Conference on Computer and Communications Security (Vienna (Austria), du 24/10/2016 au 28/10/2016).
Permanent URL http://hdl.handle.net/2078.1/181926
  1. Waksman Adam, Sethumadhavan Simha, Silencing Hardware Backdoors, 10.1109/sp.2011.27
  2. R. S. Wahby, M. Howald, S. Garg, abhi shelat, and M. Walfish. Verifiable ASICs. Cryptology ePrint Archive, Report 2015/1243. 2015.
  3. Tehranipoor Mohammad, Koushanfar Farinaz, A Survey of Hardware Trojan Taxonomy and Detection, 10.1109/mdt.2010.7
  4. S. Priya and D. J. Inman. Energy harvesting technologies. 2009.
  5. Narasimhan Seetharam, Du Dongdong, Chakraborty Rajat Subhra, Paul Somnath, Wolff Francis G., Papachristou Christos A., Roy Kaushik, Bhunia Swarup, Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis, 10.1109/tc.2012.200
  6. Moradi Amir, Poschmann Axel, Ling San, Paar Christof, Wang Huaxiong, Pushing the Limits: A Very Compact and a Threshold Implementation of AES, Advances in Cryptology – EUROCRYPT 2011 (2011) ISBN:9783642204647 p.69-88, 10.1007/978-3-642-20465-4_6
  7. Kocher Paul, Jaffe Joshua, Jun Benjamin, Differential Power Analysis, Advances in Cryptology — CRYPTO’ 99 (1999) ISBN:9783540663478 p.388-397, 10.1007/3-540-48405-1_25
  8. P. C. Kocher. "Timing Attacks on Implementations of Die-Hellman, RSA, DSS, and Other Systems". In: CRYPTO. 1996.
  9. Ishai Yuval, Prabhakaran Manoj, Sahai Amit, Wagner David, Private Circuits II: Keeping Secrets in Tamperable Circuits, Advances in Cryptology - EUROCRYPT 2006 (2006) ISBN:9783540345466 p.308-327, 10.1007/11761679_19
  10. Ishai Yuval, Sahai Amit, Wagner David, Private Circuits: Securing Hardware against Probing Attacks, Advances in Cryptology - CRYPTO 2003 (2003) ISBN:9783540406747 p.463-481, 10.1007/978-3-540-45146-4_27
  11. F. Imeson, A. Emtenan, S. Garg, and M. V. Tripunitara. "Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation". In: USENIX Security Symposium. 2013.
  12. S. K. Haider, C. Jin, M. Ahmad, D. M. Shila, O. Khan, and M. van Dijk. Advancing the State-of-the-Art in Hardware Trojans Detection. Cryptology ePrint Archive, Report 2014/943. 2014.
  13. V. Grosso, G. Leurent, F. Standaert, and K. Varici. "LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations". In: FSE. 2014.
  14. Grosso Vincent, Standaert François-Xavier, Faust Sebastian, Masking vs. multiparty computation: how large is the gap for AES?, 10.1007/s13389-014-0073-y
  15. Fox G. R., Chu F., Davenport T., Current and future ferroelectric nonvolatile memory technology, 10.1116/1.1406149
  16. S. Dziembowski, S. Faust, and F.-X. Standaert. Private Circuits III: Hardware Trojan-Resilience via Testing Amplification. Cryptology ePrint Archive. 2016.
  17. R. Cramer. "Introduction to Secure Computation". In: Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998. 1998.
  18. Chari Suresh, Jutla Charanjit S., Rao Josyula R., Rohatgi Pankaj, Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology — CRYPTO’ 99 (1999) ISBN:9783540663478 p.398-412, 10.1007/3-540-48405-1_26
  19. Chan Candace K., Peng Hailin, Liu Gao, McIlwrath Kevin, Zhang Xiao Feng, Huggins Robert A., Cui Yi, High-performance lithium battery anodes using silicon nanowires, 10.1038/nnano.2007.411
  20. Brumley Billy Bob, Tuveri Nicola, Remote Timing Attacks Are Still Practical, Computer Security – ESORICS 2011 (2011) ISBN:9783642238215 p.355-371, 10.1007/978-3-642-23822-2_20
  21. Boneh Dan, DeMillo Richard A., Lipton Richard J., On the Importance of Eliminating Errors in Cryptographic Computations, 10.1007/s001450010016
  22. Biham Eli, Shamir Adi, Differential fault analysis of secret key cryptosystems, Advances in Cryptology — CRYPTO '97 (1997) ISBN:9783540633846 p.513-525, 10.1007/bfb0052259
  23. Biham Eli, Carmeli Yaniv, Shamir Adi, Bug Attacks, Lecture Notes in Computer Science ISBN:9783540851738 p.221-240, 10.1007/978-3-540-85174-5_13
  24. Bhunia Swarup, Hsiao Michael S., Banga Mainak, Narasimhan Seetharam, Hardware Trojan Attacks: Threat Analysis and Countermeasures, 10.1109/jproc.2014.2334493
  25. C. Bayer and J.-P. Seifert. "Trojan-resilient circuits". In: PROOFS. 2013.
  26. G. Ateniese, A. Kiayias, B. Magri, Y. Tselekounis, and D. Venturi. Secure Outsourcing of Circuit Manufacturing. Cryptology ePrint Archive, Report 2016/527. 2016.
  27. Albrecht Martin R., Rechberger Christian, Schneider Thomas, Tiessen Tyge, Zohner Michael, Ciphers for MPC and FHE, Advances in Cryptology -- EUROCRYPT 2015 (2015) ISBN:9783662467992 p.430-454, 10.1007/978-3-662-46800-5_17
  28. Agrawal Dakshi, Baktir Selcuk, Karakoyunlu Deniz, Rohatgi Pankaj, Sunar Berk, Trojan Detection using IC Fingerprinting, 10.1109/sp.2007.36
  29. Adee Sally, The Hunt For The Kill Switch, 10.1109/mspec.2008.4505310
  30. J. Aarestad, D. Acharyya, R. M. Rad, and J. Plusquellic. "Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad I DDQs". In: IEEE Trans. Information Forensics and Security 4 (2010).