Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE), 2017 2017
DOI: 10.23919/date.2017.7927159
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing security breaches of countermeasures throughout the refinement process in hardware design flow

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Therefore, any glitch effect shall be easily observable. The tool that we have used for this purpose is the PAVT [21,8,24]. It allows detecting leakages at all levels of the design flow, namely the RTL, Post Synthesis (PS) and layout levels respectively.…”
Section: Side-channel Leakage Detectionmentioning
confidence: 99%
“…Therefore, any glitch effect shall be easily observable. The tool that we have used for this purpose is the PAVT [21,8,24]. It allows detecting leakages at all levels of the design flow, namely the RTL, Post Synthesis (PS) and layout levels respectively.…”
Section: Side-channel Leakage Detectionmentioning
confidence: 99%
“…4), capacitive coupling such as cross-talk, IR drop, ground/substrate coupling, etc. (refer to [18,Sec. 4.2]); 2.…”
Section: In Both Cases We Haveψ(z)ψ (Z)=0mentioning
confidence: 99%
“…In those two cases, a great care must be taken; tools as that described in [18] can help check the design is secure (or not).…”
Section: (B))mentioning
confidence: 99%