Zobrazeno 1 - 10
of 1 897
pro vyhledávání: '"Schaumont, P."'
Printed circuit boards (PCBs) are an integral part of electronic systems. Hence, verifying their physical integrity in the presence of supply chain attacks (e.g., tampering and counterfeiting) is of utmost importance. Recently, tamper detection techn
Externí odkaz:
http://arxiv.org/abs/2403.12252
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
Hardware faults are a known source of security vulnerabilities. Fault injection in secure embedded systems leads to information leakage and privilege escalation, and countless fault attacks have been demonstrated both in simulation and in practice. H
Externí odkaz:
https://doaj.org/article/b6efb1f4d82f4b9e9262d1f1ff300f8b
Autor:
Kiaei, Pantea, Yao, Yuan, Liu, Zhenyuan, Fern, Nicole, Breunesse, Cees-Bart, Van Woudenberg, Jasper, Gillis, Kate, Dich, Alex, Grossmann, Peter, Schaumont, Patrick
While side-channel leakage is traditionally evaluated from a fabricated chip, it is more time-efficient and cost-effective to do so during the design phase of the chip. We present a methodology to rank the gates of a design according to their contrib
Externí odkaz:
http://arxiv.org/abs/2204.11972
Bit-slicing is a software implementation technique that treats an N-bit processor datapath as N parallel single-bit datapaths. The natural spatial redundancy of bit-sliced software can be used to build countermeasures against implementation attacks.
Externí odkaz:
http://arxiv.org/abs/2204.06153
Publikováno v:
Proceedings of the Great Lakes Symposium on VLSI 2022 (GLSVLSI '22), June 6--8, 2022, Irvine, CA, USA
Pre-silicon side-channel leakage assessment is a useful tool to identify hardware vulnerabilities at design time, but it requires many high-resolution power traces and increases the power simulation cost of the design. By downsampling and averaging t
Externí odkaz:
http://arxiv.org/abs/2204.04160
Motivated by the rise of quantum computers, existing public-key cryptosystems are expected to be replaced by post-quantum schemes in the next decade in billions of devices. To facilitate the transition, NIST is running a standardization process which
Externí odkaz:
http://arxiv.org/abs/2203.00637
Lightweight block ciphers have been widely used in applications such as RFID tags, IoTs, and network sensors. Among them, with comparable parameters, the Light Encryption Device (LED) block cipher achieves the smallest area. However, implementation o
Externí odkaz:
http://arxiv.org/abs/2108.12079
Publikováno v:
Boston (and Beyond) Area Architecture Workshop 2021
Power-based side-channel is a serious security threat to the System on Chip (SoC). The secret information is leaked from the power profile of the system while a cryptographic algorithm is running. The mitigation requires efforts from both the softwar
Externí odkaz:
http://arxiv.org/abs/2107.01725
Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attack
Side-channel and fault injection attacks reveal secret information by monitoring or manipulating the physical effects of computations involving secret variables. Circuit-level countermeasures help to deter these attacks, and traditionally such counte
Externí odkaz:
http://arxiv.org/abs/2106.13784
The landscape of miniaturized wireless biomedical devices (MWBDs) is rapidly expanding as proactive mobile healthcare proliferates. MWBDs are diverse and include various injectable, ingestible, implantable, and wearable devices. While the growth of M
Externí odkaz:
http://arxiv.org/abs/2105.05937