Abstract | ||
---|---|---|
This paper presents a hardware isolation mechanism to protect secret information in third party IP cores subject to hardware Trojan attacks. We first implement the hardware Trojan threat model in commonly used third party IP cores, such as multiplier and RSA, which leak confidential information from the hardware under rarely triggered conditions. Then, we develop a hardware isolation-based securit... |
Year | DOI | Venue |
---|---|---|
2019 | 10.1109/TETC.2017.2648739 | IEEE Transactions on Emerging Topics in Computing |
Keywords | Field | DocType |
Hardware,Trojan horses,Security,IP networks,Runtime,Integrated circuits | ARM architecture,Hardware Trojan,Confidentiality,Information leakage,Threat model,Computer science,Operation mode,Multiplier (economics),Third party,Real-time computing,Computer hardware,Embedded system | Journal |
Volume | Issue | ISSN |
7 | 2 | 2168-6750 |
Citations | PageRank | References |
4 | 0.45 | 0 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Nianhang Hu | 1 | 4 | 0.45 |
Mengmei Ye | 2 | 6 | 3.21 |
Wei Sheng | 3 | 317 | 32.53 |