The Community for Technology Leaders
RSS Icon
Issue No.01 - January/February (2010 vol.27)
pp: 26-35
Yier Jin , Yale University
Yiorgos Makris , Yale University
<p>Editor's note:</p><p>This article studies the problem of hardware Trojans in wireless cryptographic ICs. The objective is to design Trojans to leak secret information through the wireless channel. The authors investigate challenges related to detection for such Trojans and propose using statistical analysis of the side-channel signals to help detect them.</p><p align="right"><it>&#x2014;Mohammad Tehranipoor, University of Connecticut</it></p>
design and test, hardware Trojan, statistical analysis, wireless cryptographic IC
Yier Jin, Yiorgos Makris, "Hardware Trojans in Wireless Cryptographic ICs", IEEE Design & Test of Computers, vol.27, no. 1, pp. 26-35, January/February 2010, doi:10.1109/MDT.2010.21
1. S. Adee, "The Hunt for the Kill Switch," IEEE Spectrum, vol. 45, no. 5, 2008, pp. 34-39.
2. R.M. Rad et al., "Power Supply Signal Calibration Techniques for Improving Detection Resolution to Hardware Trojans," Proc. IEEE/ACM Int'l Conf. Computer-Aided Design (ICCAD 08), IEEE CS Press, 2008, pp. 632-639.
3. F. Wolff et al., "Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme," Proc. IEEE Design Automation and Test in Europe (DATE 08), IEEE CS Press, 2008, pp. 1362-1365.
4. D. Agrawal et al., "Trojan Detection Using IC Fingerprinting," Proc. IEEE Symp. Security and Privacy, IEEE CS Press, 2007, pp. 296-310.
5. Y. Jin and Y. Makris, "Hardware Trojan Detection Using Path Delay Fingerprint," Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust, IEEE CS Press, 2008, pp. 51-57.
6. R. Rad, J. Plusquellic, and M. Tehranipoor, "Sensitivity Analysis to Hardware Trojans Using Power Supply Transient Signals," Proc. IEEE Int'l Workshop Hardware- Oriented Security and Trust, IEEE CS Press, 2008, pp. 3-7.
7. Y. Jin, N. Kupp, and Y. Makris, "Experiences in Hardware Trojan Design and Implementation," Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust, IEEE CS Press, 2009, pp. 50-57.
8. L. Lin et al., "Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering," Proc. Cryptographic Hardware and Embedded Systems, LNCS 5747, Springer-Verlag, 2009, pp. 382-395.
9. T. Yuan et al., "A Fully Integrated CMOS Transmitter for Ultra-wideband Applications," Proc. IEEE Radio Frequency Integrated Circuits Symp., IEEE Press, 2007, pp. 39-42.
10. I.T. Joliffe, Principal Component Analysis, Springer- Verlag, 1986.
11. H.G. Stratigopoulos and Y. Makris, "Error Moderation in Low-Cost Machine-Learning-Based Analog/RF Testing," IEEE Trans. Computer-Aided Design of Integrated Circuits and Systems, vol. 27, no. 2, 2008, pp. 339-351.
12. A. Candore, O. Kocabas, and F. Koushanfar, "Robust Stable Radiometric Fingerprinting for Frequency Reconfigurable Devices," Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust, IEEE CS Press, 2009, pp. 43-49.
22 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool