The Community for Technology Leaders
2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (2010)
Anaheim, CA USA
June 13, 2010 to June 14, 2010
ISBN: 978-1-4244-7811-8
TABLE OF CONTENTS

Entropy-based power attack (PDF)

Houssem Maghrebi , Département COMELEC, Institut TELECOM, TELECOM ParisTech, CNRS LTCI (UMR 5141), 46 rue Barrault, 75 634 Paris Cedex, France
Sylvain Guilley , Département COMELEC, Institut TELECOM, TELECOM ParisTech, CNRS LTCI (UMR 5141), 46 rue Barrault, 75 634 Paris Cedex, France
Jean-Luc Danger , Département COMELEC, Institut TELECOM, TELECOM ParisTech, CNRS LTCI (UMR 5141), 46 rue Barrault, 75 634 Paris Cedex, France
Florent Flament , Département COMELEC, Institut TELECOM, TELECOM ParisTech, CNRS LTCI (UMR 5141), 46 rue Barrault, 75 634 Paris Cedex, France
pp. 1-6

Low voltage fault attacks to AES (PDF)

Alessandro Barenghi , Dipartimento di Elettronica e Informazione, Politecnico di Milano, 20133, Italy
Guido M. Bertoni , STMicroelctronics, 20041 Agrate Brianza (MB), Italy
Luca Breveglieri , Dipartimento di Elettronica e Informazione, Politecnico di Milano, 20133, Italy
Mauro Pellicioli , Dipartimento di Elettronica e Informazione, Politecnico di Milano, 20133, Italy
Gerardo Pelosi , Dipartimento di Ingegneria dell'Informazione e Metodi Matematici, Università degli Studi di Bergamo, 24044 Dalmine (BG), Italy
pp. 7-12

Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach (PDF)

Seetharam Narasimhan , Case Western Reserve University, Cleveland, Ohio, USA
Dongdong Du , Case Western Reserve University, Cleveland, Ohio, USA
Rajat Subhra Chakraborty , Case Western Reserve University, Cleveland, Ohio, USA
Somnath Paul , Case Western Reserve University, Cleveland, Ohio, USA
Francis Wolff1 , Case Western Reserve University, Cleveland, Ohio, USA
Christos Papachristou , Case Western Reserve University, Cleveland, Ohio, USA
Kaushik Roy , Purdue University, West Lafayette, Indiana, USA
Swarup Bhunia , Case Western Reserve University, Cleveland, Ohio, USA
pp. 13-18

Anti-tamper JTAG TAP design enables DRM to JTAG registers and P1687 on-chip instruments (PDF)

CJ Clark , Intellitech Cjclark(at)intellitech(dot)com, USA
pp. 19-24

Using multiple processors in a single reconfigurable fabric for high-assurance applications (PDF)

Bruce Newgard , Xilinx, Inc., San Diego, CA, USA
Colby Hoffman , Xilinx, Inc., Albuquerque, NM, USA
pp. 25-29

Side-channel based watermarks for integrated circuits (PDF)

Georg T. Becker , University of Massachusetts Amherst, USA
Markus Kasper , Horst Görtz Institute for IT Security, Ruhr University Bochum, Germany
Amir Moradi , Horst Görtz Institute for IT Security, Ruhr University Bochum, Germany
Christof Paar , University of Massachusetts Amherst, USA
pp. 30-35

Multiplexing methods for power watermarking (PDF)

Daniel Ziener , Hardware/Software Co-Design, Department of Computer Science, University of Erlangen-Nuremberg, Germany
Florian Baueregger , Hardware/Software Co-Design, Department of Computer Science, University of Erlangen-Nuremberg, Germany
Jurgen Teich , Hardware/Software Co-Design, Department of Computer Science, University of Erlangen-Nuremberg, Germany
pp. 36-41

Provably secure obfuscation of diverse watermarks for sequential circuits (PDF)

Farinaz Koushanfar , Electrical and Computer Engineering, William Marsh Rice University, Houston, TX, USA
Yousra Alkabani , Computer Science, William Marsh Rice University, Houston, TX, USA
pp. 42-47

FPGA implementations of the Hummingbird cryptographic algorithm (PDF)

Xinxin Fan , E&CE Department, University of Waterloo, Ontario, N2L 3G1, CANADA
Guang Gong , E&CE Department, University of Waterloo, Ontario, N2L 3G1, CANADA
Ken Lauffenburger , Aava Technology LLC, 1206 Donegal Ln, Garland, TX 75044, USA
Troy Hicks , Revere Security Corporation, 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA
pp. 48-51

ExCCel: Exploration of complementary cells for efficient DPA attack resistivity (PDF)

Kazuyuki Tanimura , Department of Computer Science, University of California, Irvine, 92697-3425, USA
Nikil Dutt , Department of Computer Science, University of California, Irvine, 92697-3425, USA
pp. 52-55

Trusted RTL: Trojan detection methodology in pre-silicon designs (PDF)

Mainak Banga , Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, 24061, USA
Michael S. Hsiao , Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, 24061, USA
pp. 56-59

Prototyping platform for performance evaluation of SHA-3 candidates (PDF)

Leyla Nazhandali , Electrical and Computer Engineering Dept. Virginia Polytechnic Institute and State University Blacksburg, 24061, USA
Kazuyuki Kobayashi , The University of Electro-Communications, 1-5-1, Chofugaoka, Chofu, Tokyo 182-8585, Japan
Miroslav Knezevic , Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, B-3001 Heverlee, Belgium
Eric Xu Guo , Electrical and Computer Engineering Dept. Virginia Polytechnic Institute and State University Blacksburg, 24061, USA
Shin'ichiro Matsuo , National Institute of Information and Communications Technology, 4-2-1 Nukui-Kitamachi, Koganei, Tokyo 184-8795, Japan
Sinan Huang , Electrical and Computer Engineering Dept. Virginia Polytechnic Institute and State University Blacksburg, 24061, USA
Jun Ikegami , The University of Electro-Communications, 1-5-1, Chofugaoka, Chofu, Tokyo 182-8585, Japan
Unal Kocabas , Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, B-3001 Heverlee, Belgium
Junfeng Fan , Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, B-3001 Heverlee, Belgium
Akashi Satoh , Research Center for Information Security, National Institute of Advanced Industrial Science and Technology, 1-18-13, Sotokanda, Chiyoda, Tokyo 101-0021, Japan
Ingrid Verbauwhede , Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, B-3001 Heverlee, Belgium
Kazuo Sakiyama , The University of Electro-Communications, 1-5-1, Chofugaoka, Chofu, Tokyo 182-8585, Japan
Kazuo Ohta , The University of Electro-Communications, 1-5-1, Chofugaoka, Chofu, Tokyo 182-8585, Japan
pp. 60-63

A comparison of power-analysis-resistant digital circuits (PDF)

Eric Menendez , Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, Pennsylvania 15213, USA
Ken Mai , Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, Pennsylvania 15213, USA
pp. 64-69

SLICED: Slide-based concurrent error detection technique for symmetric block ciphers (PDF)

Jeyavijayan Rajendran , Department of Electrical and Computer Engineering, Polytechnic Institute of NYU, NewYork - USA
Hetal Borad , Department of Electrical and Computer Engineering, Polytechnic Institute of NYU, NewYork - USA
Shyam Mantravadi , Department of Electrical and Computer Engineering, Polytechnic Institute of NYU, NewYork - USA
Ramesh Karri , Department of Electrical and Computer Engineering, Polytechnic Institute of NYU, NewYork - USA
pp. 70-75

State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures (PDF)

Junfeng Fan , Katholieke Universiteit Leuven, ESAT/SCD-COSIC and IBBT, Kasteelpark Arenberg 10, B-3001 Heverlee, Belgium
Xu Guo , Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, 24061, USA
Elke De Mulder , Katholieke Universiteit Leuven, ESAT/SCD-COSIC and IBBT, Kasteelpark Arenberg 10, B-3001 Heverlee, Belgium
Patrick Schaumont , Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, 24061, USA
Bart Preneel , Katholieke Universiteit Leuven, ESAT/SCD-COSIC and IBBT, Kasteelpark Arenberg 10, B-3001 Heverlee, Belgium
Ingrid Verbauwhede , Katholieke Universiteit Leuven, ESAT/SCD-COSIC and IBBT, Kasteelpark Arenberg 10, B-3001 Heverlee, Belgium
pp. 76-87

Efficient one-pass entity authentication based on ECC for constrained devices (PDF)

Johann Heyszl , Fraunhofer Institute for Secure Information Technology, Munich, Germany
Frederic Stumpf , Fraunhofer Institute for Secure Information Technology, Munich, Germany
pp. 88-93

A large scale characterization of RO-PUF (PDF)

Abhranil Maiti , Electrical and Computer Engineering Department, Virginia Tech, Blacksburg, USA
Jeff Casarona , Electrical and Computer Engineering Department, Virginia Tech, Blacksburg, USA
Luke McHale , Electrical and Computer Engineering Department, Virginia Tech, Blacksburg, USA
Patrick Schaumont , Electrical and Computer Engineering Department, Virginia Tech, Blacksburg, USA
pp. 94-99

LISA: Maximizing RO PUF's secret extraction (PDF)

Chi-En Daniel Yin , Electrical and Computer Engineering Department and Institute for Advanced Computer Studies, University of Maryland College Park, MD, USA
Gang Qu , Electrical and Computer Engineering Department and Institute for Advanced Computer Studies, University of Maryland College Park, MD, USA
pp. 100-105

Attack resistant sense amplifier based PUFs (SA-PUF) with deterministic and controllable reliability of PUF responses (PDF)

Mudit Bhargava , VLSI Design Group, Department of Electrical and Computer Engineering, Carnegie Mellon Univ.
Cagla Cakir , VLSI Design Group, Department of Electrical and Computer Engineering, Carnegie Mellon Univ.
Ken Mai , VLSI Design Group, Department of Electrical and Computer Engineering, Carnegie Mellon Univ.
pp. 106-111

Sensor physical unclonable functions (PDF)

Kurt Rosenfeld , Polytechnic Institute of NYU, Brooklyn, NY, USA
Efstratios Gavas , Polytechnic Institute of NYU, Brooklyn, NY, USA
Ramesh Karri , Polytechnic Institute of NYU, Brooklyn, NY, USA
pp. 112-117

Current flattening circuit for DPA countermeasure (PDF)

Ekarat Laohavaleeson , CSEE Department, University of Maryland, Baltimore County, USA
Chintan Patel , CSEE Department, University of Maryland, Baltimore County, USA
pp. 118-123

Side-channel attack resistant ROM-based AES S-Box (PDF)

Craig Teegarden , Department of Electrical and Computer Engineering, Carnegie Mellon University, USA
Mudit Bhargava , Department of Electrical and Computer Engineering, Carnegie Mellon University, USA
Ken Mai , Department of Electrical and Computer Engineering, Carnegie Mellon University, USA
pp. 124-129

Hardware implementations of hash function Luffa (PDF)

Akashi Satoh , National Institute of Advanced Industrial Science and Technology, Research Center for Information Security, 1-18-13, Sotokanda, Chiyoda, Tokyo, 101-0021, Japan
Toshihiro Katashita , National Institute of Advanced Industrial Science and Technology, Research Center for Information Security, 1-18-13, Sotokanda, Chiyoda, Tokyo, 101-0021, Japan
Takeshi Sugawara , Graduate School of Information Sciences, Tohoku University, Sendai, Miyagi, Japan
Naofumi Homma , Graduate School of Information Sciences, Tohoku University, Sendai, Miyagi, Japan
Takafumi Aoki , Graduate School of Information Sciences, Tohoku University, Sendai, Miyagi, Japan
pp. 130-134
92 ms
(Ver 3.3 (11022016))