The Community for Technology Leaders
Hardware-Oriented Security and Trust, IEEE International Workshop on (2009)
San Francisco, CA, USA
July 27, 2009 to July 27, 2009
ISBN: 978-1-4244-4805-0
TABLE OF CONTENTS
Papers

Local heating attacks on Flash memory devices (Abstract)

Sergei Skorobogatov , Computer Laboratory, University of Cambridge, UK
pp. 1-6

Fault analysis of GRAIN-128 (Abstract)

Guilhem Castagnos , UVSQ, 45 Avenue des Etats-Unis, 78035 Versailles Cedex, France
Aline Gouget , Gemalto, 6 rue de la Verrerie, 92190 Meudon, France
Pascal Paillier , Gemalto, 6 rue de la Verrerie, 92190 Meudon, France
Alexandre Berzati , CEA-LETI/MINATEC, 17 rue des Martyrs, 38054 Grenoble Cedex 9, France
Cecile Canovas , CEA-LETI/MINATEC, 17 rue des Martyrs, 38054 Grenoble Cedex 9, France
Louis Goubin , UVSQ, 45 Avenue des Etats-Unis, 78035 Versailles Cedex, France
Stephanie Salgado , Gemalto, 6 rue de la Verrerie, 92190 Meudon, France
Blandine Debraize , Gemalto, 6 rue de la Verrerie, 92190 Meudon, France
pp. 7-14

Security evaluation of different AES implementations against practical setup time violation attacks in FPGAs (Abstract)

Jean-Luc Danger , Institut TELECOM, TELECOM ParisTech, CNRS LTCI (UMR 5141) - TCP Project, Departement COMELEC, 46 rue Barrault, 75 634 Cedex 13, FRANCE
Sylvain Guilley , Institut TELECOM, TELECOM ParisTech, CNRS LTCI (UMR 5141) - TCP Project, Departement COMELEC, 46 rue Barrault, 75 634 Cedex 13, FRANCE
Nidhal Selmane , Institut TELECOM, TELECOM ParisTech, CNRS LTCI (UMR 5141) - TCP Project, Departement COMELEC, 46 rue Barrault, 75 634 Cedex 13, FRANCE
Shivam Bhasin , Institut TELECOM, TELECOM ParisTech, CNRS LTCI (UMR 5141) - TCP Project, Departement COMELEC, 46 rue Barrault, 75 634 Cedex 13, FRANCE
pp. 15-21

Reconfigurable Physical Unclonable Functions - Enabling technology for tamper-resistant storage (Abstract)

Ahmad-Reza Sadeghi , Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany
Pim Tuyls , Katholieke Universiteit Leuven, ESAT-SCD/COSIC, Belgium
Dries Schellekens , Katholieke Universiteit Leuven, ESAT-SCD/COSIC, Belgium
Boris Skoric , Technische Universiteit Eindhoven, The Netherlands
Klaus Kursawe , Philips Research Laboratories, Eindhoven, The Netherlands
pp. 22-29

Circuit-level techniques for reliable Physically Uncloneable Functions (Abstract)

Vignesh Vivekraja , Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, 24061, USA
Leyla Nazhandali , Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, 24061, USA
pp. 30-35

Temperature-aware cooperative ring oscillator PUF (Abstract)

Chi-En Yin , Electrical and Computer Engineering Department and Institute for Advanced Computer Studies, University of Maryland, College Park, USA
Gang Qu , Electrical and Computer Engineering Department and Institute for Advanced Computer Studies, University of Maryland, College Park, USA
pp. 36-42

Robust stable radiometric fingerprinting for wireless devices (Abstract)

Farinaz Koushanfar , Electrical and Engineering Dept., Rice University, Houston, TX, 77005, USA
Ovunc Kocabas , Electrical and Engineering Dept., Rice University, Houston, TX, 77005, USA
Andrea Candore , Dept. of Information Engineering, University of Pisa, Italy, 56122
pp. 43-49

Experiences in Hardware Trojan design and implementation (Abstract)

Yier Jin , Department of Electrical Engineering, Yale University, USA
Yiorgos Makris , Departments of Electrical Engineering and Computer Science, Yale University, USA
Nathan Kupp , Department of Electrical Engineering, Yale University, USA
pp. 50-57

Performance of delay-based Trojan detection techniques under parameter variations (Abstract)

John Lach , Charles L. Brown Department of Electrical and Computer Engineering, University of Virginia, 351 McCormick Road, PO Box 400743, Charlottesville, 22904, USA
Devendra Rai , Charles L. Brown Department of Electrical and Computer Engineering, University of Virginia, 351 McCormick Road, PO Box 400743, Charlottesville, 22904, USA
pp. 58-65

New design strategy for improving hardware Trojan detection and reducing Trojan activation time (Abstract)

Mohammad Tehranipoor , ECE Department, University of Connecticut, USA
Jim Plusquellic , ECE Department, University of New Mexico, USA
Hassan Salmani , ECE Department, University of Connecticut, USA
pp. 66-73

Analysis and design of active IC metering schemes (Abstract)

Ingrid Verbauwhede , Katholieke Universiteit Leuven, ESAT-SCD/COSIC and IBBT Kasteelpark Arenberg 10, 3001 Heverlee, Belgium
Dries Schellekens , Katholieke Universiteit Leuven, ESAT-SCD/COSIC and IBBT Kasteelpark Arenberg 10, 3001 Heverlee, Belgium
Pim Tuyls , Katholieke Universiteit Leuven, ESAT-SCD/COSIC and IBBT Kasteelpark Arenberg 10, 3001 Heverlee, Belgium
Roel Maes , Katholieke Universiteit Leuven, ESAT-SCD/COSIC and IBBT Kasteelpark Arenberg 10, 3001 Heverlee, Belgium
pp. 74-81

Secure IP-block distribution for hardware devices (Abstract)

Sandeep S. Kumar , Philips Research Europe, Eindhoven, The Netherlands
Jorge Guajardo , Philips Research Europe, Eindhoven, The Netherlands
Christof Paar , Horst Görtz Institute for IT Security, Ruhr University Bochum, Germany
Tim Guneysu , Horst Görtz Institute for IT Security, Ruhr University Bochum, Germany
pp. 82-89

Early feedback on side-channel risks with accelerated toggle-counting (Abstract)

Zhimin Chen , Electrical and Computer Engineering Dept., Virginia Polytechnic Institute and State University, Blacksburg, 24061, USA
Patrick Schaumont , Electrical and Computer Engineering Dept., Virginia Polytechnic Institute and State University, Blacksburg, 24061, USA
pp. 90-95

Security through obscurity: An approach for protecting Register Transfer Level hardware IP (Abstract)

Swarup Bhunia , Department of Electrical Engineering and Computer Science, Case Western Reserve University, Cleveland, OH-44106, USA
Rajat Subhra Chakraborty , Department of Electrical Engineering and Computer Science, Case Western Reserve University, Cleveland, OH-44106, USA
pp. 96-99

OS support for detecting Trojan circuit attacks (Abstract)

Bhagirath Narahari , Dept. of Computer Science, George Washington University, DC 20052, USA
Gedare Bloom , Dept. of Computer Science, George Washington University, DC 20052, USA
Rahul Simha , Dept. of Computer Science, George Washington University, DC 20052, USA
pp. 100-103

VITAMIN: Voltage inversion technique to ascertain malicious insertions in ICs (Abstract)

Mainak Banga , Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, 24061, USA
Michael S. Hsiao , Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, 24061, USA
pp. 104-107

Dynamic evaluation of hardware trust (Abstract)

S. Bhunia , Electrical Engineering and Computer Science, Case Western Reserve University, Cleveland, Ohio 44106, USA
D. Weyer , Engineering Services, Rockwell Automation, Cleveland OH 44124, USA
F. Wolff , Electrical Engineering and Computer Science, Case Western Reserve University, Cleveland, Ohio 44106, USA
D. McIntyre , Computer Science, Cleveland State University, Ohio 44106, USA
C. Papachristou , Electrical Engineering and Computer Science, Case Western Reserve University, Cleveland, Ohio 44106, USA
pp. 108-111
107 ms
(Ver )