CSAW 2008 Team Report

نویسندگان

  • Yier Jin
  • Nathan Kupp
چکیده

Hardware Trojans are an increasingly significant threat to the integrated circuit (IC) industry in both commercial and military fields due to the progress of globalization and the rapidly improving IC manufacturing technology in various countries. Because of global economic pressures, the development and fabrication of advanced ICs are often outsourced offshore in order to reduce cost. As a result, the entire IC supply chain that was once located in one country can now often be globally distributed. To control every point of this manufacturing process, including all manufacturing facilities is almost impossible. On the other hand, compromising the IC supply chain for sensitive commercial and defense applications has become significantly easier, as control is ceded over these critical segments. In this work, we present several attack techniques, employing hardware trojans to break the security of an Alpha encryption module implemented on a Digilent BASYS Spartan-3 FPGA board.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

csaw: a Bioconductor package for differential binding analysis of ChIP-seq data using sliding windows.

Chromatin immunoprecipitation with massively parallel sequencing (ChIP-seq) is widely used to identify binding sites for a target protein in the genome. An important scientific application is to identify changes in protein binding between different treatment conditions, i.e. to detect differential binding. This can reveal potential mechanisms through which changes in binding may contribute to t...

متن کامل

Dynamics of alpha helix formation in the CSAW model.

We study the folding dynamics of polyalanine (Ala20), a protein fragment with 20 residues whose native state is a single alpha helix. We use the CSAW model (conditioned self-avoiding walk), which treats the protein molecule as a chain in Brownian motion, with interactions that include hydrophobic force and internal hydrogen bonding. We find that large-scale structures form before small-scale st...

متن کامل

Hardware Trojan Detection Using Multi-Parameter Functional Side-Channel Analysis

A hardware trojan is a modification to a hardware design which inserts undesired or malicious functionality to the design. They pose a substantial security risk, and rapid, reliable detection of these trojans has become a critical necessity. In this paper, we propose a method for detecting compromised designs quickly and effectively. The process involves a multi-parameter analysis of the design...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008