2017
DOI: 10.1016/j.micpro.2017.09.001
|View full text |Cite
|
Sign up to set email alerts
|

On the effects of ring oscillator length and hardware Trojan size on an FPGA-based implementation of AES

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 3 publications
0
6
0
1
Order By: Relevance
“…The effects of HTH attacks on various platforms have been widely explored. Hardware Trojan insertions range from cryptographic hardware [42,43] to remote dynamic configurations on reconfigurable IoT platforms [44,45]. We assume that a high-frequency clock signal is used to drive the Trojan detection unit, which can be generated by using dedicated clock generators such as the Mixed-Mode Clock Manager (MMCM) module [46].…”
Section: Hardware Trojan Detectionmentioning
confidence: 99%
“…The effects of HTH attacks on various platforms have been widely explored. Hardware Trojan insertions range from cryptographic hardware [42,43] to remote dynamic configurations on reconfigurable IoT platforms [44,45]. We assume that a high-frequency clock signal is used to drive the Trojan detection unit, which can be generated by using dedicated clock generators such as the Mixed-Mode Clock Manager (MMCM) module [46].…”
Section: Hardware Trojan Detectionmentioning
confidence: 99%
“…The insert location in the last three rounds are after SUBBYTES operation. SUBBYTES are used as one of the submodules in AES [22]. Because the structure of last three rounds are almost same, except the tenth round has no MixColumn operation, we only give the eighth round structure in the Fig.…”
Section: Implementation On Fpgamentioning
confidence: 99%
“…Compared with normal ring oscillator detection method [22], our detection method do not need any "golden" chip. Because detection circuit in [22] only based on inverter or NAND gate, the distance between HT and detection circuit impact the performance. But ours directly insert in the cipher circuit, as long as the FAHT inject it will impact the frequency.…”
Section: Comparison and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Some articles designed or considered some potential HTs from the attacker’s point of view and put forward solutions to these HTs [ 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 ]. Some researchers applied HTs to the real environment and designed a scheme to defend it [ 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 ]. Individual scholars proposed methods to reduce the effect of the HTs [ 44 , 45 ].…”
Section: Introductionmentioning
confidence: 99%