2019
DOI: 10.1109/tifs.2019.2900914
|View full text |Cite
|
Sign up to set email alerts
|

Security Implications of Intentional Capacitive Crosstalk

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…In the context of HTs, the malicious actions of concern in this paper; bit-flipping and stuck-at-faults could be realized in a number of different ways from the addition of a single logic gate and connecting it to the internal ADC wires responsible for driving ADC outputs, to the utilization of capacitive crosstalk [4].Such cross-talk based HTs could be introduced by an untrusted foundry, by adding or moving wires to increase capacitive crosstalk in the proximity of wires carrying signals of interest. A capacitive crosstalk HT could force a targeted wire to stay at logic high for several cycles, leading to a sequence of erroneous outputs [4]. Pre-existing counters in some ADCs could be utilized in activating an injected HT after a certain sequence of events.…”
Section: The Threat Vectormentioning
confidence: 99%
“…In the context of HTs, the malicious actions of concern in this paper; bit-flipping and stuck-at-faults could be realized in a number of different ways from the addition of a single logic gate and connecting it to the internal ADC wires responsible for driving ADC outputs, to the utilization of capacitive crosstalk [4].Such cross-talk based HTs could be introduced by an untrusted foundry, by adding or moving wires to increase capacitive crosstalk in the proximity of wires carrying signals of interest. A capacitive crosstalk HT could force a targeted wire to stay at logic high for several cycles, leading to a sequence of erroneous outputs [4]. Pre-existing counters in some ADCs could be utilized in activating an injected HT after a certain sequence of events.…”
Section: The Threat Vectormentioning
confidence: 99%
“…A similar notion is utilized to introduce triggers that are activated after some delay or operate on a specific voltage threshold [40]. Analog Trojans are also designed using the coupling capacitor between the victim and aggressor wire in sub-micron process technologies [41] so that the low to high transition on the aggressor can adequately affect the victim wire and flip its digital value. Similarly, RF-leaking Trojans leak the information through the Trojan-induced channel without affecting the legitimate signal/channel [10], [42].…”
Section: Analog/rf Trojansmentioning
confidence: 99%
“…Another common HT design are the sequential HTs which are triggered with a sequence of conditions and not with a specific state or condi-tion like the combinational HTs. More complex HTs include silicon wearout mechanisms [7], hidden side-channels [8], changing dopant polarity in active areas of transistors [9], siphoning charge from victim wires known as A2 attack [10], [11], activating a row in DRAM to corrupt data in nearby rows known as rowhammer attack [12], exploiting capacitive crosstalk effects [13], leveraging characteristics of emerging Non-Volatile Memories (NVMs) [14], etc.…”
Section: Introductionmentioning
confidence: 99%