Filters








920 Hits in 6.0 sec

EM Side-Channel Countermeasure for Switched-Capacitor DC-DC Converters Based on Amplitude Modulation

Ruzica Jevtic, Marko Ylitolva, Clara Calonge, Martti Ojanen, Tero Santti, Lauri Koskinen
2021 IEEE Transactions on Very Large Scale Integration (vlsi) Systems  
Noninvasive side-channel attacks pose a serious threat as they are capable of extracting secret information from distance while using low-cost equipment.  ...  In this article, we propose an efficient countermeasure technique against the electromagnetic (EM) side-channel attacks.  ...  Mariano Garcia Otero from the Technical University of Madrid for his help on evaluation metric.  ... 
doi:10.1109/tvlsi.2021.3070687 fatcat:vc6ak7brvna77me7izvkxocavy

Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures through White-Box Approach

Debayan Das, Shreyas Sen
2020 Cryptography  
Electromagnetic and power side-channel analysis (SCA) provides attackers a prominent tool to extract the secret key from the cryptographic engine.  ...  Consequently, with the knowledge of such advanced attacks, we performed a ground-up white-box analysis of the crypto IC to root-cause the source of the electromagnetic (EM) side-channel leakage.  ...  Acknowledgments: The authors would like to acknowledge Josef Danial, graduate student (MS), and Mayukh Nath, PhD student, at the SPARC Lab, Purdue University, for their technical contributions.  ... 
doi:10.3390/cryptography4040030 fatcat:a7c2gvcfzncthgfdpa7ognrh2q

2020 Index IEEE Transactions on Circuits and Systems I: Regular Papers Vol. 67

2020 IEEE Transactions on Circuits and Systems Part 1: Regular Papers  
Compact Code-Based Signature for Reconfigurable Devices With Side Channel Resilience.  ...  ., +, TCSI Dec. 2020 4747-4760 Circuit analysis computing A Strong Subthreshold Current Array PUF Resilient to Machine Learning Attacks.  ...  An N-Path Filter Design Methodology With Harmonic Rejection, Power Reduction, Foldback Elimination, and Spectrum Shaping.  ... 
doi:10.1109/tcsi.2021.3055003 fatcat:kbmst5td2bbvtl7vpbj3knnkri

2018 IndexIEEE Transactions on Very Large Scale Integration (VLSI) SystemsVol. 26

2018 IEEE Transactions on Very Large Scale Integration (vlsi) Systems  
., see 2723-2736 , VLSI Design of an ML-Based Power-Efficient Motion Estimation Controller for Intelligent Mobile Systems; TVLSI Feb. 2018 262-271 Hsieh, Y., see Tsai, Y., TVLSI May 2018 945-957  ...  Hsu, K., Chen, Y., Lee, Y., and Chang, S., Contactless Testing for Prebond Interposers; TVLSI June 2018 1005-1014 Hsu, Y., see Liu, Z., 1565-1574 Hu, J., see Wang, Y., TVLSI May 2018 805-817 Hu, J  ...  ., +, TVLSI Dec. 2018 2806-2815 A Combined Optimization-Theoretic and Side-Channel Approach for Attacking Strong Physical Unclonable Functions.  ... 
doi:10.1109/tvlsi.2019.2892312 fatcat:rxiz5duc6jhdzjo4ybcxdajtbq

Concurrent hardware Trojan detection in wireless cryptographic ICs

Yu Liu, Georgios Volanis, Ke Huang, Yiorgos Makris
2015 2015 IEEE International Test Conference (ITC)  
We introduce a Concurrent Hardware Trojan Detection (CHTD) methodology for wireless cryptographic integrated circuits (ICs), based on continuous extraction of a side-channel fingerprint and evaluation  ...  The proposed methodology is demonstrated using a hybrid experimentation platform consisting of (i) a custom-designed wireless cryptographic IC, infested with hardware Trojans that are controllable to be  ...  This research was partially supported by the National Science Foundation (NSF 1149465: THWART: Trojan Hardware in Wireless ICs: Analysis & Remedies for Trust).  ... 
doi:10.1109/test.2015.7342386 dblp:conf/itc/LiuVHM15 fatcat:ydezmf2oybczbheqkvm7yhhcpy

Review on Inductive Wireless Power Transfer Charging for Electric vehicles – A Review

Aganti Mahesh, Bharatiraja Chokkalingam, Lucian Mihet-Popa
2021 IEEE Access  
In this regard, there is a requirement for a fully automatable, fast, safe, cost-effective, and reliable charging infrastructure that provides a profitable business model and fast adoption in the electrified  ...  The static and dynamic charging techniques and their characteristics are also illustrated. The role and importance of power electronics and converter types used in various applications are discussed.  ...  Fraunhofer Institute in Germany has designed a test model using SiC MOSFET switches for a 22kW WPT charging system.  ... 
doi:10.1109/access.2021.3116678 fatcat:ldncbos37fcjrb5vkranw3hkzm

Ultra-Low-Power Design and Hardware Security Using Emerging Technologies for Internet of Things

2017 Electronics  
The uses of emerging technologies and lightweight encryption for correlation power analysis against side channel attack, silicon nanowire polymorphic gates, and all-spin logic devices for deception and  ...  These include important encryption techniques, side channel attack/defense, logic locking/split manufacturing against reverse-engineering/counterfeiting, and camouflage layout.  ...  Acknowledgments: The authors wish to thank Yu Bi for his early contribution on silicon nanowire camouflage, KATAN light-weight encryption and correlation power analysis.  ... 
doi:10.3390/electronics6030067 fatcat:ozssarlb2ng5pcdsupo2hljyna

EMC EUROPE 2020 Content Announcement Page

2020 2020 International Symposium on Electromagnetic Compatibility - EMC EUROPE  
Usychenko, Alexey; Sorokin, Leonid; Sasunkevich, Aleksandr; Kutsan, Yuriy SS02 166 Evaluation of Surface Mount Shunt Capacitor Filters Using Bilateral Magnetic Coupling Implemented to IC Power  ...  On-Chip During a Fast ESD Event Based on a Parametric Measurement Analysis Zeitlhoefler, Lena; zur Nieden, Friedrich; Esmark, Kai; Langguth, Gernot TS04 396 A Flexible and Ultrathin FSS for EM Shielding  ... 
doi:10.1109/emceurope48519.2020.9245743 fatcat:rn5cko45jfgpbeowpg4nr5hfum

Guest Editorial Toward Reliability Enhancement and Smarter Sensing for Emerging Interacting Dynamics in High Renewable Penetrated Power System

Zhen Li, Abdelali El Aroudi, Xiaozhe Wang, Innocent Kamwa
2022 IEEE Journal on Emerging and Selected Topics in Circuits and Systems  
Besides, a fast control strategy based on the proposed modeling method is developed.  ...  MODELING AND STABILITY ANALYSIS FOR HIGH RENEWABLE PENETRATED POWER SYSTEMS Mainstream modeling can be categorized into state-space modeling, impedance modeling, etc.  ... 
doi:10.1109/jetcas.2022.3156024 fatcat:4izkncdw5zhqxmo6pta2x2ejmi

2020 Index IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems Vol. 39

2020 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
., +, TCAD April 2020 857-870 FCDM: A Methodology Based on Sensor Pattern Noise Fingerprinting for Fast Confidence Detection to Adversarial Attacks.  ...  ., +, TCAD Aug. 2020 1725-1738 Thermal noise A Simple and Accurate Modeling Method of Channel Thermal Noise Using BSIM4 Noise Models.  ...  Entropy-Directed Scheduling for FPGA High-Level Synthesis. Shen, M., +, TCAD Oct. 2020 2588 -2601 FLASH: Fast, Parallel, and Accurate Simulator for HLS.  ... 
doi:10.1109/tcad.2021.3054536 fatcat:wsw3olpxzbeclenhex3f73qlw4

Voltage regulator assisted lightweight countermeasure against fault injection attacks [article]

Ali Vosoughi, Longfei Wang, Selçuk Köse
2020 arXiv   pre-print
Using the infective countermeasure for fault resiliency, the security-enhanced CC provides a robust and resilient solution against fault attacks that improve the security and availability of the device  ...  The impeccable design of sensitive and cryptographic circuits (CC) against fault injection attacks is essential for modern data storage, communication, and computation systems that are susceptible to fault  ...  paper [24] provides a protectively against side-channel attacks using the bus-invert coding scheme.  ... 
arXiv:2001.03230v1 fatcat:fjl3o4tklbejtij2vp6hsel2be

Table of Contents – Technical

2021 2021 IEEE International Joint EMC/SI/PI and EMC Europe Symposium  
Thus, currently a working group deals with new specifications for Megawatt Charging Systems (MCS) to enable DC charging at power levels of a few megavolt-amperes.  ...  The presented model could be used as a generic ESD source for fast ESD susceptibility and immunity testing’s at the design stage of a product using numerical or circuit-analysis-based  ... 
doi:10.1109/emc/si/pi/emceurope52599.2021.9559379 fatcat:bqobkpurjje4vb5xpdk56r4lpi

2020 Index IEEE Transactions on Circuits and Systems II: Express Briefs Vol. 67

2020 IEEE Transactions on Circuits and Systems - II - Express Briefs  
, H., Lu, Z., Wang, Z., Shen, Q., and Pan, H., A Novel Approximation Methodology and Its Efficient VLSI Implementation for the Sigmoid Function; 3422-3426 Qiu, Y., see Qin, Z., TCSII Dec. 2020 3422-  ...  Single Chip PWM Driver Circuit for Inverter Welding Power Source; TCSII April 2020 720-724 Jacobsson, S., see Castaneda, O., TCSII May 2020 891-895 Jafari, E., and Binazadeh, T., Robust Output Regulation  ...  Random Interrupt Dithering SAR Technique for Secure ADC Against Reference-Charge Side-Channel Attack.  ... 
doi:10.1109/tcsii.2020.3047305 fatcat:ifjzekeyczfrbp5b7wrzandm7e

Table of Contents

2020 2020 IEEE 4th Conference on Energy Internet and Energy System Integration (EI2)  
Low Voltage Side Over-current Protection with Circulating Current 204 Pa07-01 Protection Scheme for Collector Lines Based on the Current Amplitude Ratio with Spectrum Index 209 Pa07-02 Fast  ...  PLC Based on Magnetic Side Channel 3817 Po10-37 A Microgrid Controller Security Monitoring Model Based on Message Flow 3822 Po10-38 Development Path of Future Power Grid with High Proportion of Renewable  ... 
doi:10.1109/ei250167.2020.9347098 fatcat:uzijufuzb5ab3blgftr5niughe

Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

Apostolos Fournaris, Lidia Pocero Fraile, Odysseas Koufopavlou
2017 Electronics  
Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access  ...  to a device DRAM (Dynamic Random Access Memory).  ...  Fournaris conceived and structured the paper's concept, did the overview on cache35 attacks, side channel attacks and countermeasures and contributed to the survey research of the rowhammer microarchitectural  ... 
doi:10.3390/electronics6030052 fatcat:7twtik7awjdcrk62xzbaqkaq4y
« Previous Showing results 1 — 15 out of 920 results