2017
DOI: 10.1109/mdat.2017.2729398
|View full text |Cite
|
Sign up to set email alerts
|

Probing Attacks on Integrated Circuits: Challenges and Research Opportunities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 79 publications
(27 citation statements)
references
References 7 publications
0
26
0
1
Order By: Relevance
“…Sensitive information transmitted on wires in ICs can be physically extracted using contact-based electrical probing attack [10]. In this type of attack, the chip's wires are contacted by a probe, and as a result, the signal carried by the wires can be read out when the chip is functioning.…”
Section: B Vulnerabilities Of the Interconnectsmentioning
confidence: 99%
“…Sensitive information transmitted on wires in ICs can be physically extracted using contact-based electrical probing attack [10]. In this type of attack, the chip's wires are contacted by a probe, and as a result, the signal carried by the wires can be read out when the chip is functioning.…”
Section: B Vulnerabilities Of the Interconnectsmentioning
confidence: 99%
“…Firstly, using the nomenclature of [42], there obviously are no łpermanentž or łnon-volatilež digital secrets inside the TCB or the RBT interface. This implies that the GeniePUF design is immune to any attacks stealing such digital secrets, including side channels [44] or probing attacks [50]. Depending on the employed underlying Strong PUF, other secrets may be contained in the GeniePUF: If an iPUF is used, as in our example, the physical runtime delays in the iPUF will constitute łpermanent physical secretsž, again using the language of [42].…”
Section: Security and Practicality Of Our Design 41 Security Of Our Constructionmentioning
confidence: 99%
“…While SPA exploits the relationship between the operations that are executed and the power leakage, DPA exploits the relationship between the processed data and the power leakage. Over the years, several SCA techniques have been reported in the literature for differential EM analysis attacks [4], timing attacks [3], probing attacks [15] etc.…”
Section: Dpa and Resistive Bridges Fault Injectionmentioning
confidence: 99%