Book ChapterDOI
Bypassing Passive Attacks
Krishnendu Guha,Sangeet Saha,Amlan Chakrabarti +2 more
- pp 91-110
TLDR
In this paper, the authors present passive threats that do not cause direct damage by jeopardizing operations and generating erroneous results or causing stoppage of operations or even does not delay real-time operations to cause a deadline miss.Abstract:
Passive is the threat when system confidentiality is at stake. Such threats do not cause direct damage by jeopardizing operations and generating erroneous results or causing stoppage of operations or even does not delay real time operations to cause a deadline miss. Hence, such threats are passive in nature. This involves leakage of secret information to adversaries [LJM13, GSC17a, GSC15]. For example, the secret key that is associated with cryptographic operations by a genuine user may be leaked to an adversary.read more
References
More filters
Journal ArticleDOI
Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis
Seetharam Narasimhan,Dongdong Du,Rajat Subhra Chakraborty,Somnath Paul,Francis Wolff,Christos A. Papachristou,Kaushik Roy,Swarup Bhunia +7 more
TL;DR: A novel noninvasive, multiple-parameter side-channel analysisbased Trojan detection approach that uses the intrinsic relationship between dynamic current and maximum operating frequency of a circuit to isolate the effect of a Trojan circuit from process noise.
Proceedings ArticleDOI
Predictive black-box mitigation of timing channels
TL;DR: A general class of timing mitigators are introduced that can achieve any given bound on timing channel leakage, with a tradeoff in system performance.
Journal ArticleDOI
Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad ${I}_{\rm DDQ}$ s
TL;DR: Experimental results demonstrating the effectiveness of a Trojan detection method that is based on the analysis of a chip's Jddqs (steady-state current), which are measured simultaneously from multiple places on the chip are presented.
Journal ArticleDOI
Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
TL;DR: This work proposes a novel application of key-based circuit structure and functionality obfuscation to achieve protection against hardware Trojans triggered by rare internal circuit conditions and shows that the scheme is capable of achieving high levels of security against Trojan attacks at modest area, power and delay overhead.
Journal ArticleDOI
Transitioning From Standard Automation Solutions to Cyber-Physical Production Systems: An Assessment of Critical Conceptual and Technical Challenges
Luis Ribeiro,Mats Björkman +1 more
TL;DR: This paper considers the interplay between form and function of industrial components, at the light of their cyber-physical formulation, and addresses the system-level (de)composability and interaction design challenges that arise from the integration of modular CPPSs.