The Community for Technology Leaders
2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2012) (2012)
San Francisco, CA
June 3, 2012 to June 4, 2012
ISBN: 978-1-4673-2341-3
TABLE OF CONTENTS

[Front matter] (PDF)

pp. i-ix

Complementary IBS: Application specific error correction for PUFs (PDF)

Matthias Hiller , Institute for Security in Information Technology, Technische Universität München, Munich, Germany
Dominik Merli , Fraunhofer Research Institution for Applied and Integrated Security, Munich, Germany
Frederic Stumpf , Fraunhofer Research Institution for Applied and Integrated Security, Munich, Germany
Georg Sigl , Institute for Security in Information Technology, Technische Universität München, Munich, Germany
pp. 1-6

Buskeeper PUFs, a promising alternative to D Flip-Flop PUFs (PDF)

Peter Simons , Intrinsic-ID, Eindhoven, The Netherlands
Erik van der Sluis , Intrinsic-ID, Eindhoven, The Netherlands
Vincent van der Leest , Intrinsic-ID, Eindhoven, The Netherlands
pp. 7-12

Bit string analysis of Physical Unclonable Functions based on resistance variations in metals and transistors (PDF)

Jing Ju , University of New Mexico, Albuquerque, NM
Jim Plusquellic , University of New Mexico, Albuquerque, NM
Raj Chakraborty , Intel Corp., Santa Clara, CA
Reza Rad , ST Microelectronics
pp. 13-20

A novel method for watermarking sequential circuits (PDF)

Matthew Lewandowski , Department of Computer Science and Engineering, University of South Florida, Tampa, Florida
Richard Meana , Department of Computer Science and Engineering, University of South Florida, Tampa, Florida
Matthew Morrison , Department of Computer Science and Engineering, University of South Florida, Tampa, Florida
Srinivas Katkoori , Department of Computer Science and Engineering, University of South Florida, Tampa, Florida
pp. 21-24

Reliability enhancement of bi-stable PUFs in 65nm bulk CMOS (PDF)

Mudit Bhargava , Department of Electrical and Computer Engineering, Carnegie Mellon University
Cagla Cakir , Department of Electrical and Computer Engineering, Carnegie Mellon University
Ken Mai , Department of Electrical and Computer Engineering, Carnegie Mellon University
pp. 25-30

SDMLp: On the use of complementary Pass transistor Logic for design of DPA resistant circuits (PDF)

Mike Borowczak , Digital Design Environments Lab, School of Electronics and Computing Systems, University of Cincinnati, Cincinnati, Ohio 45221-0030
Ranga Vemuri , Digital Design Environments Lab, School of Electronics and Computing Systems, University of Cincinnati, Cincinnati, Ohio 45221-0030
pp. 31-36

Register leakage masking using Gray code (PDF)

Houssem Maghrebi , TELECOM-ParisTech, Crypto Lab (SEN group), 37/39 rue Dareau, 75 634 PARIS Cedex 13, France
Sylvain Guilley , TELECOM-ParisTech, Crypto Lab (SEN group), 37/39 rue Dareau, 75 634 PARIS Cedex 13, France
Emmanuel Prouff , ANSSI (Agence Nationale de la Sécurité des Systèmes d'Information), 51 boulevard de La Tour-Maubourg 75700 Paris, France
Jean-Luc Danger , TELECOM-ParisTech, Crypto Lab (SEN group), 37/39 rue Dareau, 75 634 PARIS Cedex 13, France
pp. 37-42

An adaptable, modular, and autonomous side-channel vulnerability evaluator (PDF)

Michael Zohner , Integrated Circuit and Systems Lab (ISS), Technische Universität Darmstadt
Marc Stottinger , Integrated Circuit and Systems Lab (ISS), Technische Universität Darmstadt
Sorin A. Huss , Integrated Circuit and Systems Lab (ISS), Technische Universität Darmstadt
Oliver Stein , Bundesamt für Sicherheit in der Informationstechnik (BSI)
pp. 43-48

Evaluating security requirements in a general-purpose processor by combining assertion checkers with code coverage (PDF)

Michael Bilzor , U.S. Naval Academy
Ted Huffmire , U.S. Naval Postgraduate School
Cynthia Irvine , U.S. Naval Postgraduate School
Tim Levin , U.S. Naval Postgraduate School
pp. 49-54

HTOutlier: Hardware Trojan detection with side-channel signature outlier identification (PDF)

Jie Zhang , CUhk REliable Computing Laboratory (CURE), Department of Computer Science & Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong
Haile Yu , CUhk REliable Computing Laboratory (CURE), Department of Computer Science & Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong
Qiang Xu , CUhk REliable Computing Laboratory (CURE), Department of Computer Science & Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong
pp. 55-58

t-Private logic synthesis on FPGAs (PDF)

Jungmin Park , Dept. of Electrical & Computer Engineering Iowa State University Ames, Iowa, 50010, USA
Akhilesh Tyagi , Dept. of Electrical & Computer Engineering Iowa State University Ames, Iowa, 50010, USA
pp. 63-68

Interacting with Hardware Trojans over a network (PDF)

Mohammed M. Farag , Cyber@VT, Bradley Department of Electrical and Computer Engineering, Blacksburg, VA 24061 U.S.A.
Lee W. Lerner , Cyber@VT, Bradley Department of Electrical and Computer Engineering, Blacksburg, VA 24061 U.S.A.
Cameron D. Patterson , Cyber@VT, Bradley Department of Electrical and Computer Engineering, Blacksburg, VA 24061 U.S.A.
pp. 69-74

Trojan detection based on delay variations measured using a high-precision, low-overhead embedded test structure (PDF)

Charles Lamech , ECE Department, University of New Mexico, Albuquerque, NM
Jim Plusquellic , ECE Department, University of New Mexico, Albuquerque, NM
pp. 75-82

Glitch-free implementation of masking in modern FPGAs (PDF)

Amir Moradi , Horst Görtz Institute for IT Security, Ruhr University Bochum, Germany
Oliver Mischke , Horst Görtz Institute for IT Security, Ruhr University Bochum, Germany
pp. 89-95

A systematic M safe-error detection in hardware implementations of cryptographic algorithms (PDF)

Dusko Karaklajic , KU Leuven, ESAT/SCD-COSIC and IBBT, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium
Junfeng Fan , KU Leuven, ESAT/SCD-COSIC and IBBT, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium
Ingrid Verbauwhede , KU Leuven, ESAT/SCD-COSIC and IBBT, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium
pp. 96-101

Functional integrated circuit analysis (PDF)

Dmitry Nedospasov , Security in Telecommunications, Dept. of Software Engineering and Theoretical Computer Science, Technische Universität Berlin, Berlin, Germany
Jean-Pierre Seifert , Security in Telecommunications, Dept. of Software Engineering and Theoretical Computer Science, Technische Universität Berlin, Berlin, Germany
Alexander Schlosser , Optical Technologies, Institute for Optics and Atomic Physics, Technische Universität Berlin, Berlin, Germany
Susanna Orlic , Optical Technologies, Institute for Optics and Atomic Physics, Technische Universität Berlin, Berlin, Germany
pp. 102-107

Performance metrics and empirical results of a PUF cryptographic key generation ASIC (Abstract)

Meng-Day Mandel Yu , Verayo, Inc., San Jose, CA, USA
Richard Sowell , Verayo, Inc., San Jose, CA, USA
Alok Singh , Verayo, Inc., San Jose, CA, USA
David M'Raihi , Verayo, Inc., San Jose, CA, USA
Srinivas Devadas , MIT, Cambridge, MA, USA
pp. 108-115

HSDL: A Security Development Lifecycle for hardware technologies (PDF)

Hareesh Khattri , Security Center of Excellence (SeCoE), Intel Corporation, Hillsboro, OR - 97124
Narasimha Kumar V Mangipudi , Security Center of Excellence (SeCoE), Intel Corporation, Hillsboro, OR - 97124
Salvador Mandujano , Security Center of Excellence (SeCoE), Intel Corporation, Hillsboro, OR - 97124
pp. 116-121

Design solutions for securing SRAM cell against power analysis (PDF)

Vladimir Rozic , Katholieke Universiteit Leuven, ESAT/SCD/COSIC and IBBT, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium
Wim Dehaene , Katholieke Universiteit Leuven, ESAT/MICAS and IMEC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium
Ingrid Verbauwhede , Katholieke Universiteit Leuven, ESAT/SCD/COSIC and IBBT, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium
pp. 122-127

On charge sensors for FIB attack detection (PDF)

Clemens Helfmeier , Berlin University of Technology, Berlin, Germany
Christian Boit , Berlin University of Technology, Berlin, Germany
Uwe Kerst , Berlin University of Technology, Berlin, Germany
pp. 128-133

Detection of probing attempts in secure ICs (PDF)

Salvador Manich , Electronic Engineering Dep., UPC BarcelonaTech, Barcelona, Spain
Markus S. Wamser , Lehrstuhl für Sicherheit in der Informationstechnik, Technische Universität München, Munich, Germany
Georg Sigl , Lehrstuhl für Sicherheit in der Informationstechnik, Technische Universität München, Munich, Germany
pp. 134-139

Fault Round Modification Analysis of the advanced encryption standard (PDF)

Jean-Max Dutertre , Département Systèmes et Architectures Sécurisées (SAS), École Nationale Supérieure des Mines de Saint-Étienne (ENSMSE), Gardanne, France
Amir-Pasha Mirbaha , Département Systèmes et Architectures Sécurisées (SAS), École Nationale Supérieure des Mines de Saint-Étienne (ENSMSE), Gardanne, France
David Naccache , Équipe de cryptographie, École normale supérieure (ENS), Paris, France
Anne-Lise Ribotta , Département Systèmes et Architectures Sécurisées (SAS), École Nationale Supérieure des Mines de Saint-Étienne (ENSMSE), Gardanne, France
Assia Tria , Département Systèmes et Architectures Sécurisées (SAS), CEA-LETI, Gardanne, France
Thierry Vaschalde , Département Systèmes et Architectures Sécurisées (SAS), École Nationale Supérieure des Mines de Saint-Étienne (ENSMSE), Gardanne, France
pp. 140-145

Improved algebraic side-channel attack on AES (PDF)

Mohamed Saied Emam Mohamed , Technische Universita¨t Darmstadt, Department of Computer Science, Hochschulstraße 10, 64289 Darmstadt, Germany
Stanislav Bulygin , Technische Universita¨t Darmstadt, Department of Computer Science, Hochschulstraße 10, 64289 Darmstadt, Germany
Michael Zohner , Center for Advanced Security Research Darmstadt (CASED) Mornewegstraße 32, 64293, Germany
Annelie Heuser , Center for Advanced Security Research Darmstadt (CASED) Mornewegstraße 32, 64293, Germany
Michael Walter , Technische Universita¨t Darmstadt, Department of Computer Science, Hochschulstraße 10, 64289 Darmstadt, Germany
Johannes Buchmann , Technische Universita¨t Darmstadt, Department of Computer Science, Hochschulstraße 10, 64289 Darmstadt, Germany
pp. 146-151
96 ms
(Ver 3.3 (11022016))