In this article we present a new side-channel building block for FPGAs, which, akin to the old Roman god of Janus, has two contradictory faces: as a watermarking tool, it allows to uniquely identify IP cores by adding a single slice to the design; as a Trojan Side-Channel (TSC) it can potentially leak an entire encryption key within only one trace and without the knowledge of either the plaintext or the ciphertext. We practically verify TROJANUS' feasibility by embedding it as a TSC into a lightweight FPGA implementation of PRESENT. Besides, we investigate the leakage behavior of FPGAs in more detail and present a new pre-processing technique, which can potentially increase the correlation coefficient of DPA attacks.Accepted versio
Side-channel attacks have become a very important and well-studied area in computer security. Tradit...
International audienceAs FPGA use becomes more diverse, the shareduse of these devices becomes a sec...
The security of a cyber-physical system depends on the safety of the handled data, software, and und...
Abstract. The general trend in semiconductor industry to separate de-sign from fabrication leads to ...
While most current cryptographic efforts focus on designing ciphers resistant to mathe-matical attac...
Hardware Trojans have gained high attention in academia, industry and by government agencies. The ef...
International audienceThis chapter presents the main Side-Channel Attacks, a kind of hardware crypta...
Abstract Since the introduction of the first side-channel analyses in academia about 15 years ago, s...
Trojan side channels (TSCs) are serious threats to the security of cryp-tographic systems because th...
Side-channel analyses constitute a major threat for embedded devices, because they allow an attacker...
In this survey we introduce a few secure hardware implementation methods for FPGA platforms in the c...
Over the last two decades FPGAs have become central com-ponents for many advanced digital systems, e...
This paper is a short summary of a real world AES key extraction performed on a military grade FPGA ...
Abstract. Hardware Trojans (HTs) are an emerging threat for Inte-grated Circuits (ICs) integrity and...
Over the last two decades FPGAs have become central com-ponents for many advanced digital systems, e...
Side-channel attacks have become a very important and well-studied area in computer security. Tradit...
International audienceAs FPGA use becomes more diverse, the shareduse of these devices becomes a sec...
The security of a cyber-physical system depends on the safety of the handled data, software, and und...
Abstract. The general trend in semiconductor industry to separate de-sign from fabrication leads to ...
While most current cryptographic efforts focus on designing ciphers resistant to mathe-matical attac...
Hardware Trojans have gained high attention in academia, industry and by government agencies. The ef...
International audienceThis chapter presents the main Side-Channel Attacks, a kind of hardware crypta...
Abstract Since the introduction of the first side-channel analyses in academia about 15 years ago, s...
Trojan side channels (TSCs) are serious threats to the security of cryp-tographic systems because th...
Side-channel analyses constitute a major threat for embedded devices, because they allow an attacker...
In this survey we introduce a few secure hardware implementation methods for FPGA platforms in the c...
Over the last two decades FPGAs have become central com-ponents for many advanced digital systems, e...
This paper is a short summary of a real world AES key extraction performed on a military grade FPGA ...
Abstract. Hardware Trojans (HTs) are an emerging threat for Inte-grated Circuits (ICs) integrity and...
Over the last two decades FPGAs have become central com-ponents for many advanced digital systems, e...
Side-channel attacks have become a very important and well-studied area in computer security. Tradit...
International audienceAs FPGA use becomes more diverse, the shareduse of these devices becomes a sec...
The security of a cyber-physical system depends on the safety of the handled data, software, and und...