2017
DOI: 10.1007/978-3-319-70694-8_26
|View full text |Cite
|
Sign up to set email alerts
|

The First Thorough Side-Channel Hardware Trojan

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
2
1

Relationship

4
5

Authors

Journals

citations
Cited by 24 publications
(16 citation statements)
references
References 55 publications
0
15
0
Order By: Relevance
“…Our first-order secure implementation should therefore be combined with hiding countermeasures, such as random shuffling and noise modules. As an example we refer to [24], where the design of such a noise generator on the same FPGA type is given. A combination of lowering the SNR and restricting the number of encryptions performed with the same key should be able to avoid higher-order attacks in practice.…”
Section: Discussionmentioning
confidence: 99%
“…Our first-order secure implementation should therefore be combined with hiding countermeasures, such as random shuffling and noise modules. As an example we refer to [24], where the design of such a noise generator on the same FPGA type is given. A combination of lowering the SNR and restricting the number of encryptions performed with the same key should be able to avoid higher-order attacks in practice.…”
Section: Discussionmentioning
confidence: 99%
“…Reference [32] demonstrates how easy it is to insert an HT which induces side-channel leakage to recover a key once triggered. This Trojan is inserted by modifying a few gates during manufacturing to increase path delay.…”
Section: Hardware Trojan Based Side-channel Attacksmentioning
confidence: 99%
“…In such cases, adding noise modules would surely help to harden higher-order attacks. As an example we refer to [EGMP17], where the design of such a noise generator on the same FPGA type is given.…”
Section: Sca Evaluationmentioning
confidence: 99%