Filters








3,826 Hits in 5.8 sec

A Tutorial on Physical Security and Side-Channel Attacks [chapter]

François Koeune, François-Xavier Standaert
2005 Lecture Notes in Computer Science  
This paper aims at providing a tutorial on the subject, overviewing the main kinds of attacks and highlighting their underlying principles.  ...  A recent branch of cryptography focuses on the physical constraints that a real-life cryptographic device must face, and attempts to exploit these constraints (running time, power consumption, . . . )  ...  The goal of this paper is to provide the reader with a first tutorial on physical security.  ... 
doi:10.1007/11554578_3 fatcat:4zw63o6xs5hvjlll7mc3mvts4a

Tutorial T7: Physically Unclonable Function: A Promising Security Primitive for Internet of Things

Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen, Durga Prasad Sahoo
2015 2015 28th International Conference on VLSI Design  
Lightweight authentication protocols for resource {constrained smart devices should be secure against "physical attacks" such as Side-Channel Attack.  ...  However, the concept of PUF is not a panacea in the domain of security, and they are still vulnerable to several forms of intelligent attacks, using a combina-tion of concepts borrowed from side-channel  ...  His research interests include cryptanalysis, crypto system design, side channel attacks and physically unclonable functions.  ... 
doi:10.1109/vlsid.2015.115 dblp:conf/vlsid/MukhopadhyayCNS15 fatcat:xboo6zjy5zailgnwrydoli46cu

Ensuring high testability without degrading security: Embedded tutorial on "test and security"

G. Di Natale, M.-L. Flottes, B. Rouzeyre
2010 13th IEEE Symposium on Design and Diagnostics of Electronic Circuits and Systems  
(side-channel attacks), faulty behaviors (fault-based attacks), or internal states (DFT-based attacks) for instance.  ...  This tutorial will address these issues presenting the security weaknesses generated by classical DFT techniques, pros and cons of security-dedicated DFT, BIST and Fault tolerance solutions, and impact  ...  However, the hardware implementation of these cryptographic algorithms allows the hackers to measure the observable characteristics of the physical implementation and deduce the secret key (side-channel  ... 
doi:10.1109/ddecs.2010.5491831 dblp:conf/ddecs/NataleFR10 fatcat:qpiwwn6frzea7mrsla4bcj7stu

Self-Test Techniques for Crypto-Devices

Giorgio Di Natale, Marion Doulcier, Marie-Lise Flottes, Bruno Rouzeyre
2010 IEEE Transactions on Very Large Scale Integration (vlsi) Systems  
(side-channel attacks), faulty behaviors (fault-based attacks), or internal states (DFT-based attacks) for instance.  ...  This tutorial will address these issues presenting the security weaknesses generated by classical DFT techniques, pros and cons of security-dedicated DFT, BIST and Fault tolerance solutions, and impact  ...  However, the hardware implementation of these cryptographic algorithms allows the hackers to measure the observable characteristics of the physical implementation and deduce the secret key (side-channel  ... 
doi:10.1109/tvlsi.2008.2010045 fatcat:oo5wmhja3bd6jlyo4ohvkhkowq

Security and Dependability of Embedded Systems: A Computer Architects' Perspective

Jörg Henkel, Vijaykrishnan Narayanan, Sri Parameswaran, Roshan Ragel
2009 2009 22nd International Conference on VLSI Design  
Thus this tutorial will examine the overlapping concerns of security and dependability and the design methods used to overcome the problems and threats.  ...  A significant number of techniques that are used to overcome security and dependability are the same or have similar origins.  ...  Security threats in embedded systems could be classified by the means used to launch attacks. Typical launch methods are: physical, logical/softwarebased and side-channel/lateral attacks.  ... 
doi:10.1109/vlsi.design.2009.114 dblp:conf/vlsid/HenkelNPR09 fatcat:ukstklaxcjfnhjmzvuxxannjeu

[Front matter]

2020 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)  
The Program Chairs tracked the number of years each candidate has served on the TPC. Past and potential TPC members outline their top ten topics of expertise in hardware and systems security.  ...  are available to the attendees "on-demand" before, during, and after the event.  ...  Going from AES128 to AES 256 only improves protection by 2x when side-channel attacks are employed, making physical side-channel attacks a significant threa.  ... 
doi:10.1109/host45689.2020.9300269 fatcat:nruhx3qym5evvpk3bbki7pvfdq

Cyber-Physical Systems Security and Privacy

Jorg Henkel
2017 IEEE design & test  
And indeed this is what our guest editors provided to us: this special issue covers a wide area of research-and industry-relevant articles, among others, on side channels, lightweight encryption for Internet  ...   The focus of this issue of IEEE Design&Test is on cyber-physical systems security and privacy. Research in cyber-physical systems (CPS) has enjoyed a large increase over the past years.  ...  And indeed this is what our guest editors provided to us: this special issue covers a wide area of research-and industry-relevant articles, among others, on side channels, lightweight encryption for Internet  ... 
doi:10.1109/mdat.2017.2713356 fatcat:b67exmvyjffs7bcx2tdudm7rfy

Game Theory for Cyber Deception: A Tutorial [article]

Quanyan Zhu
2019 arXiv   pre-print
Additionally, control theory can be used to quantify the physical impact of attack and defense strategies.  ...  The tutorial aims to provide a taxonomy of deception and counter-deception and understand how they can be conceptualized, quantified, and designed or mitigated.  ...  The baseline games can be further extended to include side-channel information, system dynamics, and the influence of the third party.  ... 
arXiv:1903.01442v1 fatcat:prcxrq3eq5hq3arhfboq6uhb7u

Constructive and destructive aspects of embedded security in the internet of things

Christof Paar
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
In this talk, we will focus on side-channel attacks, or SCA, which form arguably the most powerful method among physical attacks.  ...  These examples show the destructive and constructive aspects of modern embedded security. In this tutorial we will address both the constructive and "penetration testing" aspect of embedded security.  ...  In this talk, we will focus on side-channel attacks, or SCA, which form arguably the most powerful method among physical attacks.  ... 
doi:10.1145/2508859.2516757 dblp:conf/ccs/Paar13 fatcat:7ua4tyndvbdlzed4ug6sgpofyi

Hardware enhanced security

Ruby Lee, Simha Sethumadhavan, G. Edward Suh
2012 Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12  
This tutorial presents some of these hardware-enhanced security techniques to the security community.  ...  There have been significant efforts recently in hardware communities that aim to leverage hardware strengths to secure software layers, and also to secure hardware itself.  ...  ACM 978-1-4503-1651-4/12/10. • Secure processor and multicore architectures • Secure cloud computing • Hardware backdoors and Trojans • Hardware mitigation of cache side channelsPhysical Security Functions  ... 
doi:10.1145/2382196.2382323 dblp:conf/ccs/LeeSS12 fatcat:vbazuke3djfspfgf45gtrcisiu

Wireless physical layer security [Guest Editorial]

Walid Saad, Xiangyun Zhou, Mérouane Debbah, H. Vincent Poor
2015 IEEE Communications Magazine  
His research interests include wireless and social networks, game theory, cybersecurity, smart grid, network science, cognitive radio, and self-organizing networks. Dr.  ...  Walid Saad (S'07, M'10) is an Assistant Professor at the Bradley Department of Electrical and Computer Engineering at Virginia Tech.  ...  The feature topic concludes with an article that describes various passive (traffic analysis) and active (jamming) attacks that are facilitated by side-channel information.  ... 
doi:10.1109/mcom.2015.7355560 fatcat:bnys6vkcqjfwdel5nmq7ojtfoa

Tutorial: Open-Source EDA and Machine Learning for IC Design: A Live Update

Abdelrahman Hosny, Andrew B. Kahng
2020 2020 33rd International Conference on VLSI Design and 2020 19th International Conference on Embedded Systems (VLSID)  
The target audience of this tutorial includes EDA researchers and developers, graduate students and professors, and IC design methodologists, physical design engineers, and managers.  ...  Whether you are a veteran in EDA / IC design or just starting a career, the tutorial will give a new perspective and a roadmap to use and contribute to open-source EDA. Speaker Bios: Andrew B.  ...  Side-channel attack (SCA) is one of the prominent methods to break the security of an encryption system by exploiting the information leaked from the physical devices.  ... 
doi:10.1109/vlsid49098.2020.00016 dblp:conf/vlsid/HosnyK20 fatcat:gsvvnrgbr5dpdjwkkx63jnf2f4

Trustworthy Hardware [Scanning the Issue]

Ramesh Karri, Farinaz Koushanfar
2014 Proceedings of the IEEE  
Security and trust should be considered as a first class metric during all stages in the IC and system design flows sideby-side power, cost, and performance.  ...  It explains novel hardware security primitives such as physical unclonable functions (PUFs), public PUFs (PPUFs), and random number generators.  ...  The first paper ''Physical unclonable functions and applications: A tutorial'' is a tutorial on ongoing work in physical-disorderbased security, security analysis, and implementation choices.  ... 
doi:10.1109/jproc.2014.2334837 fatcat:oifb7mphljhrhpdzbqfexw3h6y

Front Matter: Volume 9842

2016 Signal Processing, Sensor/Information Fusion, and Target Recognition XXV  
using a Base 36 numbering system employing both numerals and letters.  ...  Utilization of CIDs allows articles to be fully citable as soon as they are published online, and connects the same identifier to all online and print versions of the publication.  ...  Smart Grid Cyber Security Synchrophasor Devices in Smart Grid Documented security vulnerabilities Side-Channelsin PMU Traffic Packet Size Side-Channel Inter Packet Timing Side-Channel Side-Channel  ... 
doi:10.1117/12.2246519 fatcat:o7i6ebo6o5hftlqmo7rqhrjony

IEEE Communications Surveys and Tutorials

Dusit Tao Niyato
2021 IEEE Communications Surveys and Tutorials  
In particular, these articles survey and tutor various issues in "Internet Technologies," "Network Security," "Network Virtualization," "Optical Communications," "Vehicular and Sensor Communications,"  ...  A brief account for each of these papers is given below.  ...  Being resource-constrained, drones are highly vulnerable to physical and cyber-attacks/threats. In this context, [A22] presents a tutorial and survey.  ... 
doi:10.1109/comst.2021.3124645 fatcat:lsax4a6u2rhg3idcgbewyr5sfm
« Previous Showing results 1 — 15 out of 3,826 results