谷歌浏览器插件
订阅小程序
在清言上使用

Hardware Trojan Attacks on Voltage Scaling-Based Side-Channel Attack Countermeasure

IET circuits, devices & systems(2019)

引用 4|浏览3
暂无评分
摘要
Here, the side-channel attack (SCA)-resistant cryptographic chip: a cryptographic circuit employs a voltage scaling technique is studied with hardware Trojan attacks. Two different types of hardware Trojans, sequential hardware Trojan and combinational hardware Trojan, are proposed to be embedded into the SCA-resistant cryptographic chip for leaking the secret key. Moreover, the sequential Trojan can only disclose a single bit of the secret key at a time, while the combinational Trojan is able to leak the whole bit of the secret key at once. As demonstrated in the results, only analysing ∼270 (150) power traces are sufficient to disclose the 8-bit secret key of the sequential (combinational) Trojan-infected chip to the adversary. Furthermore, both the sequential and combinational Trojan-infected chips can evade the testing of the power attack and be detected with the proposed statistical models successfully.
更多
查看译文
关键词
invasive software,cryptography,combinational circuits,sequential circuits,hardware Trojan attacks,voltage scaling-based side-channel attack countermeasure,cryptographic circuit,voltage scaling technique,SCA-resistant cryptographic chip,sequential Trojan-infected chip,power attack,secret key,side-channel attack-resistant cryptographic chip,combinational hardware Trojan,sequential hardware Trojan,combinational Trojan-infected chips,statistical models
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要