Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Temperature-Triggered Hardware Trojan Based Algebraic Fault Analysis of SKINNY-64-64 Lightweight Block Cipher

    Lei Zhu, Jinyue Gong, Liang Dong*, Cong Zhang

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5521-5537, 2023, DOI:10.32604/cmc.2023.037336

    Abstract SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length, and it is mainly used on the Internet of Things (IoT). Currently, faults can be injected into cryptographic devices by attackers in a variety of ways, but it is still difficult to achieve a precisely located fault attacks at a low cost, whereas a Hardware Trojan (HT) can realize this. Temperature, as a physical quantity incidental to the operation of a cryptographic device, is easily overlooked. In this paper, a temperature-triggered HT (THT) is designed, which, when activated, causes a specific bit of the intermediate state… More >

  • Open Access

    ARTICLE

    An Evolutionary Algorithm for Non-Destructive Reverse Engineering of Integrated Circuits

    Huan Zhang1,2, Jiliu Zhou1,2,*, Xi Wu2

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.3, pp. 1151-1175, 2021, DOI:10.32604/cmes.2021.015462

    Abstract In hardware Trojan detection technology, destructive reverse engineering can restore an original integrated circuit with the highest accuracy. However, this method has a much higher overhead in terms of time, effort, and cost than bypass detection. This study proposes an algorithm, called mixed-feature gene expression programming, which applies non-destructive reverse engineering to the chip with bypass detection data. It aims to recover the original integrated circuit hardware, or else reveal the unknown circuit design in the chip. More >

Displaying 1-10 on page 1 of 2. Per Page