Side-channel analysis-based detection approach of hardware Trojans

被引:3
|
作者
Wang, Li-Wei [1 ,2 ]
Luo, Hong-Wei [2 ]
Yao, Ruo-He [1 ]
机构
[1] School of Electronic and Information Engineering, South China University of Technology, Guangzhou 510640, Guangdong, China
[2] Science and Technology on Reliability Physics and Application of Electronic Component Laboratory, The Fifth Electronics Research Institute of the Ministry of Industry and Information Technology, Guangzhou 510610, Guangdong, China
关键词
Detection approach - Integrated circuit chips - Malicious circuits - Orders of magnitude - Process Variation - Reliability degradation - Side-channel analysis - Validation results;
D O I
10.3969/j.issn.1000-565X.2012.06.002
中图分类号
学科分类号
摘要
引用
收藏
页码:6 / 10
相关论文
共 50 条
  • [31] Hardware Trojan Design and Its Detection using Side-Channel Analysis on Cryptographic Hardware AES Implemented on FPGA
    Hanindhito, Bagus
    Kurniawan, Yusuf
    PROCEEDING OF 2019 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI), 2019, : 191 - 196
  • [32] An Unsupervised Detection Approach for Hardware Trojans
    Dong, Chen
    Liu, Yulin
    Chen, Jinghui
    Liu, Ximeng
    Guo, Wenzhong
    Chen, Yuzhong
    IEEE ACCESS, 2020, 8 : 158169 - 158183
  • [33] HTOutlier: Hardware Trojan detection with side-channel signature outlier identification
    Zhang, Jie
    Yu, Haile
    Xu, Qiang
    Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, 2012, : 55 - 58
  • [34] SCA-LFD: Side-Channel Analysis-Based Load Forecasting Disturbance in the Energy Internet
    Ding, Li
    Wu, Jun
    Li, Changlian
    Jolfaei, Alireza
    Zheng, Xi
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2023, 70 (03) : 3199 - 3208
  • [35] Hardware Trojan Detection Through Chip-Free Electromagnetic Side-Channel Statistical Analysis
    He, Jiaji
    Zhao, Yiqiang
    Guo, Xiaolong
    Jin, Yier
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2017, 25 (10) : 2939 - 2948
  • [36] The First Thorough Side-Channel Hardware Trojan
    Ender, Maik
    Ghandali, Samaneh
    Moradi, Amir
    Paar, Christof
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 : 755 - 780
  • [37] Side-Channel Protected PIPO Implementation in Hardware
    Han, Jaeseung
    Kim, Yeon-Jae
    Han, Dong-Guk
    2024 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2024, 2024,
  • [38] ASCON hardware implementations and side-channel evaluation
    Gross, Hannes
    Wenger, Erich
    Dobraunig, Christoph
    Ehrenhoefer, Christoph
    MICROPROCESSORS AND MICROSYSTEMS, 2017, 52 : 470 - 479
  • [39] An intelligent classification method for Trojan detection based on side-channel analysis
    Wang, Chenxu
    Li, Jinghu
    Yu, Mingyan
    Wang, Jinxiang
    IEICE ELECTRONICS EXPRESS, 2013, 10 (17):
  • [40] Fight Hardware with Hardware: Systemwide Detection and Mitigation of Side-channel Attacks Using Performance Counters
    Carna, Stefano
    Ferracci, Serena
    Quaglia, Francesco
    Pellegrini, Alessandro
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (01):