scispace - formally typeset
Book ChapterDOI

Bypassing Passive Attacks

TLDR
In this paper, the authors present passive threats that do not cause direct damage by jeopardizing operations and generating erroneous results or causing stoppage of operations or even does not delay real-time operations to cause a deadline miss.
Abstract
Passive is the threat when system confidentiality is at stake. Such threats do not cause direct damage by jeopardizing operations and generating erroneous results or causing stoppage of operations or even does not delay real time operations to cause a deadline miss. Hence, such threats are passive in nature. This involves leakage of secret information to adversaries [LJM13, GSC17a, GSC15]. For example, the secret key that is associated with cryptographic operations by a genuine user may be leaked to an adversary.

read more

References
More filters
Journal ArticleDOI

Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis

TL;DR: A novel noninvasive, multiple-parameter side-channel analysisbased Trojan detection approach that uses the intrinsic relationship between dynamic current and maximum operating frequency of a circuit to isolate the effect of a Trojan circuit from process noise.
Proceedings ArticleDOI

Predictive black-box mitigation of timing channels

TL;DR: A general class of timing mitigators are introduced that can achieve any given bound on timing channel leakage, with a tradeoff in system performance.
Journal ArticleDOI

Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad ${I}_{\rm DDQ}$ s

TL;DR: Experimental results demonstrating the effectiveness of a Trojan detection method that is based on the analysis of a chip's Jddqs (steady-state current), which are measured simultaneously from multiple places on the chip are presented.
Journal ArticleDOI

Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation

TL;DR: This work proposes a novel application of key-based circuit structure and functionality obfuscation to achieve protection against hardware Trojans triggered by rare internal circuit conditions and shows that the scheme is capable of achieving high levels of security against Trojan attacks at modest area, power and delay overhead.
Journal ArticleDOI

Transitioning From Standard Automation Solutions to Cyber-Physical Production Systems: An Assessment of Critical Conceptual and Technical Challenges

TL;DR: This paper considers the interplay between form and function of industrial components, at the light of their cyber-physical formulation, and addresses the system-level (de)composability and interaction design challenges that arise from the integration of modular CPPSs.
Related Papers (5)
Trending Questions (2)
What is the difference between active and passive security threats?

The paper does not provide information about the difference between active and passive security threats.

What is the difference between active and passive security threats?

The paper does not provide information about the difference between active and passive security threats.