Learn More
The general trend in semiconductor industry to separate design from fabrication leads to potential threats from untrusted integrated circuit foundries. In particular, malicious hardware components can be covertly inserted at the foundry to implement hidden backdoors for unauthorized exposure of secret information. This paper proposes a new class of hardware(More)
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circuit foundries to covertly implant malicious hardware Trojans into a genuine design. Hardware Trojans provide back doors for on-chip manipulation, or leak secret information off-chip(More)
— This paper explores a spectrally efficient, variable rate transmission scheme under a service outage constraint for a block fading channel model. The service outage constraint is motivated by real time variable rate applications. In a service outage, the transmission code rate is below a given basic rate and may in fact be zero. Unlike an information(More)
Throughput maximization of an adaptive transmission system with a finite number of transmitted power levels and code rates for communication over slow fading channels is analyzed based on the concept of information outage. Properties of throughput maximizing policies lead to an iterative algorithm that yields good system designs. Numerical results show that(More)
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depends on minute uncontrollable process variations, a low supply voltage can benefit PUFs by providing high sensitivity to variations and low power consumption as well. Motivated by(More)
Embedded cryptosystems show increased vulnerabilities to implementation attacks such as power analysis. CMOS technology trends are causing increased process variations which impact the data-dependent power of deep submicron cryptosystem designs. In this paper, we use Monte Carlo methods in SPICE circuit simulations to analyze the statistical properties of(More)
—Since the vulnerability of cryptosystems to differential power analysis (DPA) was reported in 1999, various power analysis attacks and corresponding countermeasures have been studied. With the scaling down of supply voltage and CMOS technology below 90nm, leakage power plays an increasing role in the overall power dissipation. Future cryptosystems need to(More)