Skip to main content

Showing 1–2 of 2 results for author: Ghandali, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:1910.00737  [pdf, other

    cs.CR cs.AR

    Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations

    Authors: Samaneh Ghandali, Thorben Moos, Amir Moradi, Christof Paar

    Abstract: Hardware Trojans have drawn the attention of academia, industry and government agencies. Effective detection mechanisms and countermeasures against such malicious designs can only be developed when there is a deep understanding of how hardware Trojans can be built in practice, in particular Trojans specifically designed to avoid detection. In this work, we present a mechanism to introduce an extre… ▽ More

    Submitted 22 September, 2019; originally announced October 2019.

  2. arXiv:1910.00735  [pdf, other

    cs.CR cs.AR

    Temperature-Based Hardware Trojan For Ring-Oscillator-Based TRNGs

    Authors: Samaneh Ghandali, Daniel Holcomb, Christof Paar

    Abstract: True random number generators (TRNGs) are essential components of cryptographic designs, which are used to generate private keys for encryption and authentication, and are used in masking countermeasures. In this work, we present a mechanism to design a stealthy parametric hardware Trojan for a ring oscillator based TRNG architecture proposed by Yang et al. at ISSCC 2014. Once the Trojan is trigge… ▽ More

    Submitted 22 September, 2019; originally announced October 2019.