The Community for Technology Leaders
2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (2014)
Arlington, VA, USA
May 6, 2014 to May 7, 2014
ISBN: 978-1-4799-4114-8
TABLE OF CONTENTS

[Front matter] (PDF)

pp. i-x

Building trusted ICs using split fabrication (Abstract)

Kaushik Vaidyanathan , Carnegie Mellon University, Pittsburgh, PA 15213, USA
Bishnu P Das , Carnegie Mellon University, Pittsburgh, PA 15213, USA
Ekin Sumbul , Carnegie Mellon University, Pittsburgh, PA 15213, USA
Renzhi Liu , Carnegie Mellon University, Pittsburgh, PA 15213, USA
Larry Pileggi , Carnegie Mellon University, Pittsburgh, PA 15213, USA
pp. 1-6

Split-fabrication obfuscation: Metrics and techniques (Abstract)

Meenatchi Jagasivamani , Information Sciences Institute, University of Southern California, 3811 N. Fairfax Dr. Suite 200, Arlington, VA 22203, USA
Peter Gadfort , Information Sciences Institute, University of Southern California, 3811 N. Fairfax Dr. Suite 200, Arlington, VA 22203, USA
Michel Sika , Information Sciences Institute, University of Southern California, 3811 N. Fairfax Dr. Suite 200, Arlington, VA 22203, USA
Michael Bajura , Information Sciences Institute, University of Southern California, 3811 N. Fairfax Dr. Suite 200, Arlington, VA 22203, USA
Michael Fritze , Information Sciences Institute, University of Southern California, 3811 N. Fairfax Dr. Suite 200, Arlington, VA 22203, USA
pp. 7-12

Efficient and secure intellectual property (IP) design with split fabrication (Abstract)

Kaushik Vaidyanathan , Carnegie Mellon University, Pittsburgh, PA 15213, USA
Renzhi Liu , Carnegie Mellon University, Pittsburgh, PA 15213, USA
Ekin Sumbul , Carnegie Mellon University, Pittsburgh, PA 15213, USA
Qiuling Zhu , Carnegie Mellon University, Pittsburgh, PA 15213, USA
Franz Franchetti , Carnegie Mellon University, Pittsburgh, PA 15213, USA
Larry Pileggi , Carnegie Mellon University, Pittsburgh, PA 15213, USA
pp. 13-18

Verification of untrusted chips using trusted layout and emission measurements (Abstract)

Franco Stellari , IBM Watson Research Center - 1101 Kitchawan Rd, Yorktown Height, NY, 10598, USA
Peilin Song , IBM Watson Research Center - 1101 Kitchawan Rd, Yorktown Height, NY, 10598, USA
Alan J. Weger , IBM Watson Research Center - 1101 Kitchawan Rd, Yorktown Height, NY, 10598, USA
Jim Culp , IBM System and Technology Group - 2070 Rt 52, Hopewell Junction, NY 1253, USA
A. Herbert , IBM System and Technology Group - 2070 Rt 52, Hopewell Junction, NY 1253, USA
D. Pfeiffer , IBM Watson Research Center - 1101 Kitchawan Rd, Yorktown Height, NY, 10598, USA
pp. 19-24

Cryptographically secure shields (Abstract)

Jean-Michel Cioranesco , Sorbonne Universités - Université Paris II, 12 place du Panthéon, 75 231, Cedex 05, France
Jean-Luc Danger , Institut MINES-TELECOM, TELECOM-ParisTech, CNRS LTCI (UMR 5141), 46 rue Barrault, 75 634 Cedex 13, France
Tarik Graba , Institut MINES-TELECOM, TELECOM-ParisTech, CNRS LTCI (UMR 5141), 46 rue Barrault, 75 634 Cedex 13, France
Sylvain Guilley , Institut MINES-TELECOM, TELECOM-ParisTech, CNRS LTCI (UMR 5141), 46 rue Barrault, 75 634 Cedex 13, France
Yves Mathieu , Institut MINES-TELECOM, TELECOM-ParisTech, CNRS LTCI (UMR 5141), 46 rue Barrault, 75 634 Cedex 13, France
David Naccache , Sorbonne Universités - Université Paris II, 12 place du Panthéon, 75 231, Cedex 05, France
Xuan Thuy Ngo , Institut MINES-TELECOM, TELECOM-ParisTech, CNRS LTCI (UMR 5141), 46 rue Barrault, 75 634 Cedex 13, France
pp. 25-31

Side-channel leakage on silicon substrate of CMOS cryptographic chip (Abstract)

Daisuke Fujimoto , Kobe University, Japan
Daichi Tanaka , Kobe University, Japan
Noriyuki Miura , Kobe University, Japan
Makoto Nagata , Kobe University, Japan
Yu-ichi Hayashi , Tohoku University, Japan
Naofumi Homma , Tohoku University, Japan
Shivam Bhasin , Telecom Paristech, France
Jean-Luc Danger , Telecom Paristech, Secure IC, France
pp. 32-37

On design of a highly secure PUF based on non-linear current mirrors (Abstract)

Raghavan Kumar , Department of Electrical and Computer Engineering, University of Massachusetts Amherst, USA
Wayne Burleson , Department of Electrical and Computer Engineering, University of Massachusetts Amherst, USA
pp. 38-43

Entropy loss in PUF-based key generation schemes: The repetition code pitfall (Abstract)

Patrick Koeberl , Intel Labs, USA
Jiangtao Li , Intel Labs, USA
Anand Rajan , Intel Labs, USA
Wei Wu , Intel Labs, USA
pp. 44-49

Composite PUF: A new design paradigm for Physically Unclonable Functions on FPGA (Abstract)

Durga Prasad Sahoo , SEAL/CSE, Indian Institute of Technology, Kharagpur - 721302, India
Sayandeep Saha , SEAL/CSE, Indian Institute of Technology, Kharagpur - 721302, India
Debdeep Mukhopadhyay , SEAL/CSE, Indian Institute of Technology, Kharagpur - 721302, India
Rajat Subhra Chakraborty , SEAL/CSE, Indian Institute of Technology, Kharagpur - 721302, India
Hitesh Kapoor , SEAL/CSE, Indian Institute of Technology, Kharagpur - 721302, India
pp. 50-55

A look into SIMON from a side-channel perspective (Abstract)

Shivam Bhasin , TELECOM-ParisTech 46 rue Barrault, 75 634 Cedex 13, FRANCE
Tarik Graba , TELECOM-ParisTech 46 rue Barrault, 75 634 Cedex 13, FRANCE
Jean-Luc Danger , TELECOM-ParisTech 46 rue Barrault, 75 634 Cedex 13, FRANCE
Zakaria Najm , TELECOM-ParisTech 46 rue Barrault, 75 634 Cedex 13, FRANCE
pp. 56-59

Increasing the efficiency of laser fault injections using fast gate level reverse engineering (Abstract)

Franck Courbon , GEMALTO, Security Labs, La Ciotat, France
Philippe Loubet-Moundi , GEMALTO, Security Labs, La Ciotat, France
Jacques J.A. Fournier , CEA, CEA Tech Region, DPACA/LSAS, Gardanne, France
Assia Tria , CEA, CEA Tech Region, DPACA/LSAS, Gardanne, France
pp. 60-63

IP-level implementation of a resistance-based physical unclonable function (Abstract)

Dylan Ismari , University of New Mexico, USA
Jim Plusquellic , University of New Mexico, USA
pp. 64-69

Security of SoC firmware load protocols (Abstract)

Sava Krstic , Strategic CAD Labs, Intel Corporation, USA
Jin Yang , Strategic CAD Labs, Intel Corporation, USA
David W. Palmer , Product Development Group, Intel Corporation, USA
Randy B. Osborne , Product Development Group, Intel Corporation, USA
Eran Talmor , Core CAD Technologies, Intel Corporation, USA
pp. 70-75

A hierarchical formal approach to verifying side-channel resistant cryptographic processors (Abstract)

Kotaro Okamoto , Graduate School of Information Sciences, Tohoku University, Aramaki Aza Aoba 6-6-5, Sendai 980-8579, Japan
Naofumi Homma , Graduate School of Information Sciences, Tohoku University, Aramaki Aza Aoba 6-6-5, Sendai 980-8579, Japan
Takafumi Aoki , Graduate School of Information Sciences, Tohoku University, Aramaki Aza Aoba 6-6-5, Sendai 980-8579, Japan
Sumio Morioka , Central Research Laboratories, NEC Corporation, Athene, Odyssey Business Park, West End Road, South Ruislip, Middlesex HA4 6QE, U.K
pp. 76-79

Optimality and beyond: The case of 4×4 S-boxes (Abstract)

Stjepan Picek , Digital Security Group - ICIS, Radboud University Nijmegen, The Netherlands
Baris Ege , Digital Security Group - ICIS, Radboud University Nijmegen, The Netherlands
Kostas Papagiannopoulos , Digital Security Group - ICIS, Radboud University Nijmegen, The Netherlands
Lejla Batina , Digital Security Group - ICIS, Radboud University Nijmegen, The Netherlands
Domagoj Jakobovic , Faculty of Electrical Engineering and Computing, University of Zagreb, Croatia
pp. 80-83

EM-based detection of hardware trojans on FPGAs (Abstract)

Oliver Soll , Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, 8010, Austria
Thomas Korak , Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, 8010, Austria
Michael Muehlberghuber , Integrated Systems Laboratory (IIS), ETH Zurich, Gloriastrasse 35, 8092, Switzerland
Michael Hutter , Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, 8010, Austria
pp. 84-87

Robust keys from physical unclonable functions (Abstract)

Merrielle Spain , MIT Lincoln Laboratory, USA
Benjamin Fuller , MIT Lincoln Laboratory, USA
Kyle Ingols , MIT Lincoln Laboratory, USA
Robert Cunningham , MIT Lincoln Laboratory, USA
pp. 88-92

Side-channel countermeasure for SHA-3 at almost-zero area overhead (Abstract)

Mostafa Taha , Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, 24061, USA
Patrick Schaumont , Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, 24061, USA
pp. 93-96

A frequency leakage model for SCA (Abstract)

S. Tiran , LIRMM - 161, Rue Ada, 34090 Montpellier Cedex 5 France
S. Ordas , LIRMM - 161, Rue Ada, 34090 Montpellier Cedex 5 France
Y. Teglia , STMicroelectronics - Advanced System Technology - Avenue Célestin Coq, 13790 Rousset, France
M. Agoyan , STMicroelectronics - Advanced System Technology - Avenue Célestin Coq, 13790 Rousset, France
P. Maurine , LIRMM - 161, Rue Ada, 34090 Montpellier Cedex 5 France
pp. 97-100

Bit selection algorithm suitable for high-volume production of SRAM-PUF (Abstract)

Kan Xiao , ECE Department, University of Connecticut, CT, USA
Md. Tauhidur Rahman , ECE Department, University of Connecticut, CT, USA
Domenic Forte , ECE Department, University of Connecticut, CT, USA
Yu Huang , Synokey LLC, MA, USA
Mei Su , Synokey LLC, MA, USA
Mohammad Tehranipoor , ECE Department, University of Connecticut, CT, USA
pp. 101-106

Hardware trojan detection by symmetry breaking in path delays (Abstract)

Norimasa Yoshimizu , NanoMason Inc., Martinez, California 94553, USA
pp. 107-111

Experimental evaluation of two software countermeasures against fault attacks (Abstract)

Nicolas Moro , Commissariat à l'Énergie Atomique et aux Énergies Alternatives (CEA), 13541 Gardanne, France
Karine Heydemann , Sorbonne Universités, UPMC Univ Paris 06, UMR 7606 CNRS, LIP6, 75005, France
Amine Dehbaoui , SERMA Technologies, CESTI, 33615 Pessac, France
Bruno Robisson , Commissariat à l'Énergie Atomique et aux Énergies Alternatives (CEA), 13541 Gardanne, France
Emmanuelle Encrenaz , Sorbonne Universités, UPMC Univ Paris 06, UMR 7606 CNRS, LIP6, 75005, France
pp. 112-117

NREPO: Normal basis Recomputing with Permuted Operands (Abstract)

Xiaofei Guo , New York University, USA
Debdeep Mukhopadhyay , Indian Institute of Technology Kharagpur, India
Chenglu Jin , New York University, USA
Ramesh Karri , New York University, USA
pp. 118-123

A noise bifurcation architecture for linear additive physical functions (Abstract)

Meng-Day Yu , Verayo, Inc., San Jose, CA, USA
David M'Raihi , Verayo, Inc., San Jose, CA, USA
Ingrid Verbauwhede , COSIC, KU Leuven, Belgium
Srinivas Devadas , MIT, Cambridge, MA, USA
pp. 124-129

Analysis of the fault injection mechanism related to negative and positive power supply glitches using an on-chip voltmeter (Abstract)

Loic Zussa , Ecole Nationale Superieure des Mines de Saint-Etienne (ENSM.SE), Gardanne, France
Jean-Max Dutertre , Ecole Nationale Superieure des Mines de Saint-Etienne (ENSM.SE), Gardanne, France
Jessy Clediere , Commissariat a l'Energie Atomique et aux Energies Alternatives (CEA), Gardanne/Grenoble, France
Bruno Robisson , Commissariat a l'Energie Atomique et aux Energies Alternatives (CEA), Gardanne/Grenoble, France
pp. 130-135

Power supply glitch attacks: Design and evaluation of detection circuits (Abstract)

Kamil Gomina , STMicroelectronics Crolles, France
Jean-Baptiste Rigaud , Ecole Nationale Supérieure des Mines de Saint-Etienne, Gardanne, France
Philippe Gendrier , STMicroelectronics Crolles, France
Philippe Candelier , STMicroelectronics Crolles, France
Assia Tria , Ecole Nationale Supérieure des Mines de Saint-Etienne, Gardanne, France
pp. 136-141

New scan attacks against state-of-the-art countermeasures and DFT (Abstract)

Sk Subidh Ali , New York University Abu Dhabi (NYUAD), USA
Ozgur Sinanoglu , New York University Abu Dhabi (NYUAD), USA
Samah Mohamed Saeed , Polytechnic Institute of New York University, USA
Ramesh Karri , Polytechnic Institute of New York University, USA
pp. 142-147

Countering the effects of silicon aging on SRAM PUFs (Abstract)

Roel Maes , Intrinsic-ID, Eindhoven, The Netherlands
Vincent van der Leest , Intrinsic-ID, Eindhoven, The Netherlands
pp. 148-153

DWM-PUF: A low-overhead, memory-based security primitive (Abstract)

Anirudh Iyengar , Computer Science and Engineering, University of South Florida, USA
Kenneth Ramclam , Computer Science and Engineering, University of South Florida, USA
Swaroop Ghosh , Computer Science and Engineering, University of South Florida, USA
pp. 154-159

A Chaotic Ring oscillator based Random Number Generator (Abstract)

Siva Nishok Dhanuskodi , Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, USA
Arunkumar Vijayakumar , Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, USA
Sandip Kundu , Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, USA
pp. 160-165
94 ms
(Ver 3.3 (11022016))