6th Conference on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE 2016), Barcelona, 14-16 November, 2016
Summary
-
Evaluation of AIS-20/31 compliant TRNG cores implemented on FPGAs
(2016-11-14)
Conference report
Open AccessFPGAs are widely used to integrate cryptographic primitives, algorithms, and protocols in cryptographic systemson- chip (CrySoC). As a building block of CrySoCs, True Random Number Generators (TRNGs) exploit analog noise ... -
Platform for Testing and Evaluation of PUF and TRNG Implementations in FPGAs
(2016-11-16)
Conference report
Open AccessImplementation of cryptographic primitives like Physical Unclonable Functions (PUFs) and True Random Number Generators (TRNGs) depends significantly on the underlying hardware. Common evaluation boards offered by FPGA ... -
Small Scale AES Toolbox: Algebraic and Propositional Formulas, Circuit-Implementations and Fault Equations
(2016-11-15)
Conference report
Open AccessCryptography is one of the key technologies ensuring security in the digital domain. As such, its primitives and implementations have been extensively analyzed both from a theoretical, cryptoanalytical perspective, as ... -
Real-time encryption and authentication of medical video streams on FPGA
(2016-11-16)
Conference report
Open AccessThis work presents an FPGA-based solution for the encryption and authentication of video streams of surgeries. The most important is minimal latency. To achieve this, a block cipher with an authenticated mode of operation ... -
Fault Injection on FPGA implementations of Trivium Stream Cipher using Clock Attacks
(2016-11-15)
Conference report
Open Access -
Vulnerability Evaluation and Secure Design Methodology of Cryptohardware for ASIC-embedded Secure Applications to Prevent Side-Channel Attacks
(2016-11-14)
Conference report
Open Access -
A Reliable Low-area Low-power PUF-based Key Generator
(2016-11-14)
Conference report
Open AccessThis paper reports the implementation of a lowarea low-power 128-bit PUF-based key generation module which exploits a novel Two-Stage IDentification (TSID) cell showing a higher noise immunity then a standard SRAM cell. ... -
A comparison of PUF cores suitable for FPGA devices
(2016-11-14)
Conference report
Open AccessA PUF extracts a unique identifier per die using physical random variation caused by variability of the manufacturing process. PUFs can be used for hardware authentication, but also as generators of confidential keys. ... -
Dynamic Security-aware Routing for Zone-based data Protection in Multi-Processor System-on-Chips
(2016-11-16)
Conference report
Open AccessIn this work, we propose a NoC which enforces the encapsulation of sensitive traffic inside the asymmetrical security zones while using minimal and non-minimal paths. The NoC routes guarantee that the sensitive traffic ... -
Smart Card Fault Injections with High Temperatures
(2016-11-15)
Conference report
Open AccessPower and clock glitch attacks on smart cards can help an attacker to discover some internal secrets or bypass certain security checks. Also, an attacker can manipulate the temperature and supply voltage of the device, ... -
A Low-Cost Unified Experimental FPGA Board for Cryptography Applications
(2016-11-16)
Conference report
Open AccessThis paper describes the evaluation of available experimental boards, the comparison of their supported set of experiments and other aspects. The second part of this evaluation is focused on the design process of the ... -
Random masking interleaved scrambling technique as a countermeasure for DPA/DEMA attacks in cache memories
(2016-11-15)
Conference report
Open AccessMemory remanence in SRAMs and DRAMs is usually exploited through cold-boot attacks and the targets are the main memory and the L2 cache memory. Hence, a sudden power shutdown may give an attacker the opportunity to ... -
Secure and Efficient RNS Approach for Elliptic Curve Cryptography
(2016-11-15)
Conference report
Open AccessScalar multiplication, the main operation in elliptic curve cryptographic protocols, is vulnerable to side-channel (SCA) and fault injection (FA) attacks. An efficient countermeasure for scalar multiplication can be ... -
Reusing Logic Masking to Facilitate Hardware Trojan Detection
(2016-11-16)
Conference report
Open AccessHardware Trojan (HT) and Integrated Circuit (IC)/ Intellectual Property (IP) piracy are important threats which may happen in untrusted fabrication foundries. Modifying structurally the ICs/IPs design to counter the HT ... -
Residue Number System Hardware Emulator and Instructions Generator
(2016-11-15)
Conference report
Open AccessResidue Number System (RNS) is an alternative form of representing integers on which a large value gets represented by a set of smaller and independent integers. Cryptographic and signal filtering algorithms benefit ... -
Hiding Higher-Order Side-Channel Leakage – Randomizing Threshold Implementations in Reconfigurable Hardware –
(2016-11-15)
Conference report
Restricted access - confidentiality agreement -
On the parallelization of slice-based Keccak implementations on Xilinx FPGAs
(2016-11-16)
Conference report
Open AccessThis work explores the parallelization of slice-based lightweight Keccak implementations. The functionality of Xilinx FPGAs to use a single slice as a 32-bit Shift Register Lookup table (SRL) was recently used by ... -
From Full-Custom to Fully-Standard Cell Power Analysis Countermeasures
(2016-11-16)
Conference report
Open AccessSide-Channel Analysis (SCA) attacks have become one of the most significant problems in modern digital systems. These attacks exploit and misuse the information related to the physical behavior of cryptographic devices ... -
Electromagnetic Analysis Perturbation using Chaos Generator
(2016-11-14)
Conference report
Open AccessCryptographic algorithms albeit mathematically sure may have security breaches when implemented on hardware chips. There are several ways to compromise their security, one method is to analyze their electromagnetic (EM) ... -
Malware in IoT Software and Hardware
(2016-11-14)
Conference report
Open Access -
A Self-Repairable TRNG
(2016-11-14)
Conference report
Open Access -
Modeling SRAM cell stability for randomness evaluation of PUF cells
(2016-11-14)
Conference report
Open Access -
Authentication of IC based on Electromagnetic Signature
(2016-11-14)
Conference report
Open AccessIC Counterfeiting is becoming serious issue. The approach discussed here is to use Electromagnetic (EM) input to an IC and measure its EM input output response. The idea is to extract a signature from EM response which ... -
Circuit Clustering Methods for Netlist Reverse Engineering
(2016-11-16)
Conference report
Restricted access - confidentiality agreement -
The SALVADOR simulation framework
(2016-11-15)
Conference report
Open Access -
Spatial Correlations in Physical Unclonable Functions
(2016-11-15)
Conference report
Open AccessPhysical Unclonable Functions (PUFs) are circuits which extract a device dependent secret from inherently available manufacturing variations. This work focuses on evaluating the quality of such circuits regarding intra-die ... -
Extended Abstract: Analysis of 1000 Arbiter PUF based RFID Tags
(2016-11-14)
Conference report
Open AccessIn this extended abstract a large-scale analysis of 4- way Arbiter PUFs is performed with measurement results from 1000 RFID tags. Arbiter PUFs are one of the most important building blocks in PUF-based protocols and ... -
Using LUT-specific delays to mitigate biases in delay-based PUFs and increase area efficiency on FPGAs
(2016-11-14)
Conference report
Restricted access - confidentiality agreement -
Influence of Fault-tolerant Design Methods on Resistance against Differential Power Analysis in FPGA
(2016-11-15)
Conference report
Restricted access - confidentiality agreement -
Side-Channel Leakage Models for IoT Processors
(2016-11-16)
Conference report
Restricted access - confidentiality agreement -
Trustworthy Communications across Parallel Asynchronous Channels with Glitches
(2016-11-15)
Conference report
Open AccessTransmission across asynchronous communication channels is subject to laser injection attacks which cause glitches – pulses that are added to the transmitted signal at arbitrary times. This paper presents self-synchronizing ... -
Security Evaluation of Cyber-Physical Systems in Society- Critical Internet of Things
(2016-11-15)
Conference report
Open AccessIn this paper, we present evaluation of security awareness of developers and users of cyber-physical systems. Our study includes interviews, workshops, surveys and one practical evaluation. We conducted 15 interviews ... -
Secure Silicon: Towards Virtual Prototyping
(2016-11-14)
Conference report
Open AccessEvaluating security vulnerabilities of software implementations at design step is of primary importance for applications developers, while it has received litte attention from scientific communauty. In this paper, we ... -
Trojans in Early Design Steps—An Emerging Threat
(2016-11-16)
Conference report
Open AccessHardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks ... -
On the Machine Learning Techniques for Side-channel Analysis
(2016-11-16)
Conference report
Open AccessSide-channel attacks represent one of the most powerful category of attacks on cryptographic devices with profiled attacks in a prominent place as the most powerful among them. Indeed, for instance, template attack is ... -
Experimental results on smartcards’ IC EM radiation
(2016-11-15)
Conference report
Open Access -
H.264 Motion Vectors Based Cyber Defense/Attack Techniques
(2016-11-15)
Conference report
Open Access -
Invited Speaker
(2016-11-16)
Conference report
Open Access -
Keynote Speech
(2016-11-14)
Conference report
Open Access -
Program
(2016-11-14)
Conference report
Open Access -
Welcome
(2016-11-14)
Conference report
Open Access -
Committees
(2016-11-14)
Conference report
Open Access -
On the Hardware Implementation Efficiency of CAESAR Authentication Ciphers for FPGA Devices
(2016-11-16)
Conference report
Open Access