Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/2734
Full metadata record
DC FieldValueLanguage
dc.contributor.authorK, Sudeendra Kumar-
dc.contributor.authorSahoo, Sauvagya-
dc.contributor.authorMahapatra, Abhishek-
dc.contributor.authorSwain, Ayas Kanta-
dc.contributor.authorMahapatra, Kamalakanta-
dc.date.accessioned2017-07-20T07:18:59Z-
dc.date.available2017-07-20T07:18:59Z-
dc.date.issued2017-07-
dc.identifier.citationIEEE Computer Society Annual Symposium on VLSI, July 3-5, 2017, Bochum, Germanyen_US
dc.identifier.urihttp://hdl.handle.net/2080/2734-
dc.descriptionCopyright of this paper belongs to proceedings publisheren_US
dc.description.abstractHardware Trojan (HT) is one of the well known hardware security issue in research community in last one decade. HT research is mainly focused on HT detection, HT defense and designing novel HT’s. HT’s are inserted by an adversary for leaking secret data, denial of service attacks etc. Trojan benchmark circuits for processors, cryptography and communication protocols from Trust-hub are widely used in HT research. And power analysis based side channel attacks and designing countermeasures against side channel attacks is a well established research area. Trust-Hub provides a power based side-channel attack promoting Advanced Encryption Standard (AES) HT benchmarks for research. In this work, we analyze the strength of AES HT benchmarks in the presence well known side-channel attack countermeasures. Masking, Random delay insertion and tweaking the operating frequency of clock used in sensitive operations are applied on AES benchmarks. Simulation and power profiling studies confirm that side-channel promoting HT benchmarks are resilient against these selected countermeasures and even in the presence of these countermeasures; an adversary can get the sensitive data by triggering the HT.en_US
dc.subjectHardware Trojanen_US
dc.subjectHardware Securityen_US
dc.subjectSide-channel attacken_US
dc.titleAnalysis of Side-Channel Attack AES Hardware Trojan Benchmarks against Countermeasuresen_US
dc.typeWorking Paperen_US
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
2017_ISVLSI_SudeendraKK_Analysis.pdf276.13 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.