A method is proposed to implement a hardware Trojan that can be used to leak confidential information in RF and mm-wave circuits. The method modifies the input impedance matching network of a power amplifier by using a single nMOS transistor. Input matching of the power amplifier changes with digital data that is covertly transmitted and this slight change (0.63 dB) is observed at the output gain of the power amplifier, which ultimately changes the power level of the signal that arrives at the receiver. The inserted nMOS transistor and interconnections are hidden under transmission lines and ground planes, making them invisible to the user. The efficacy of the proposed methodology is demonstrated by using full EM simulations of a 77 GHz pow...
This thesis explores the possibility of detecting the hidden presence of wireless eavesdroppers. Suc...
This dissertation introduces techniques for passively determining the instructions executed by embed...
Abstract This paper investigates the possibility of detecting the presence of hidden radio‐frequency...
A method is proposed to implement a hardware Trojan that can be used to leak confidential informatio...
We present a new class of covert channels which can be created by utilizing common hardware but tha...
The outsourcing of the manufacturing process of integrated circuits to fabrications plants all over ...
Abstract. In this paper we propose a novel approach to implement high ca-pacity, covert channel by e...
With the globalization of integrated circuit design and fabrication process, the main concerned issu...
The problem of information leakage through electromagnetic waves for various devices has been extens...
With the emergence of mass-market applications, such as Wireless-HD, low-cost CMOS technologies are ...
As feature size is scaling down, dynamic power consumption reduces but static power consumption incr...
The threat of chip-level tampering and its detection has been widely researched. Hardware Trojan ins...
Abstract. The general trend in semiconductor industry to separate de-sign from fabrication leads to ...
Moore’s law has, for almost half a century, described a trend in which the number of transistors in ...
Using silicon measurements from 40 chips fabricated in Taiwan Semiconductor Manufacturing Company\u2...
This thesis explores the possibility of detecting the hidden presence of wireless eavesdroppers. Suc...
This dissertation introduces techniques for passively determining the instructions executed by embed...
Abstract This paper investigates the possibility of detecting the presence of hidden radio‐frequency...
A method is proposed to implement a hardware Trojan that can be used to leak confidential informatio...
We present a new class of covert channels which can be created by utilizing common hardware but tha...
The outsourcing of the manufacturing process of integrated circuits to fabrications plants all over ...
Abstract. In this paper we propose a novel approach to implement high ca-pacity, covert channel by e...
With the globalization of integrated circuit design and fabrication process, the main concerned issu...
The problem of information leakage through electromagnetic waves for various devices has been extens...
With the emergence of mass-market applications, such as Wireless-HD, low-cost CMOS technologies are ...
As feature size is scaling down, dynamic power consumption reduces but static power consumption incr...
The threat of chip-level tampering and its detection has been widely researched. Hardware Trojan ins...
Abstract. The general trend in semiconductor industry to separate de-sign from fabrication leads to ...
Moore’s law has, for almost half a century, described a trend in which the number of transistors in ...
Using silicon measurements from 40 chips fabricated in Taiwan Semiconductor Manufacturing Company\u2...
This thesis explores the possibility of detecting the hidden presence of wireless eavesdroppers. Suc...
This dissertation introduces techniques for passively determining the instructions executed by embed...
Abstract This paper investigates the possibility of detecting the presence of hidden radio‐frequency...