Title
Surviving Information Leakage Hardware Trojan Attacks Using Hardware Isolation
Abstract
This paper presents a hardware isolation mechanism to protect secret information in third party IP cores subject to hardware Trojan attacks. We first implement the hardware Trojan threat model in commonly used third party IP cores, such as multiplier and RSA, which leak confidential information from the hardware under rarely triggered conditions. Then, we develop a hardware isolation-based securit...
Year
DOI
Venue
2019
10.1109/TETC.2017.2648739
IEEE Transactions on Emerging Topics in Computing
Keywords
Field
DocType
Hardware,Trojan horses,Security,IP networks,Runtime,Integrated circuits
ARM architecture,Hardware Trojan,Confidentiality,Information leakage,Threat model,Computer science,Operation mode,Multiplier (economics),Third party,Real-time computing,Computer hardware,Embedded system
Journal
Volume
Issue
ISSN
7
2
2168-6750
Citations 
PageRank 
References 
4
0.45
0
Authors
3
Name
Order
Citations
PageRank
Nianhang Hu140.45
Mengmei Ye263.21
Wei Sheng331732.53