Please use this identifier to cite or link to this item:
http://hdl.handle.net/2080/2734
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | K, Sudeendra Kumar | - |
dc.contributor.author | Sahoo, Sauvagya | - |
dc.contributor.author | Mahapatra, Abhishek | - |
dc.contributor.author | Swain, Ayas Kanta | - |
dc.contributor.author | Mahapatra, Kamalakanta | - |
dc.date.accessioned | 2017-07-20T07:18:59Z | - |
dc.date.available | 2017-07-20T07:18:59Z | - |
dc.date.issued | 2017-07 | - |
dc.identifier.citation | IEEE Computer Society Annual Symposium on VLSI, July 3-5, 2017, Bochum, Germany | en_US |
dc.identifier.uri | http://hdl.handle.net/2080/2734 | - |
dc.description | Copyright of this paper belongs to proceedings publisher | en_US |
dc.description.abstract | Hardware Trojan (HT) is one of the well known hardware security issue in research community in last one decade. HT research is mainly focused on HT detection, HT defense and designing novel HT’s. HT’s are inserted by an adversary for leaking secret data, denial of service attacks etc. Trojan benchmark circuits for processors, cryptography and communication protocols from Trust-hub are widely used in HT research. And power analysis based side channel attacks and designing countermeasures against side channel attacks is a well established research area. Trust-Hub provides a power based side-channel attack promoting Advanced Encryption Standard (AES) HT benchmarks for research. In this work, we analyze the strength of AES HT benchmarks in the presence well known side-channel attack countermeasures. Masking, Random delay insertion and tweaking the operating frequency of clock used in sensitive operations are applied on AES benchmarks. Simulation and power profiling studies confirm that side-channel promoting HT benchmarks are resilient against these selected countermeasures and even in the presence of these countermeasures; an adversary can get the sensitive data by triggering the HT. | en_US |
dc.subject | Hardware Trojan | en_US |
dc.subject | Hardware Security | en_US |
dc.subject | Side-channel attack | en_US |
dc.title | Analysis of Side-Channel Attack AES Hardware Trojan Benchmarks against Countermeasures | en_US |
dc.type | Working Paper | en_US |
Appears in Collections: | Conference Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
2017_ISVLSI_SudeendraKK_Analysis.pdf | 276.13 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.