Learn More
Action: Functionality of the malicious hardware Modify functionality Leak secret information Action: Functionality of the malicious hardware Modify functionality Leak secret information Action: Functionality of the malicious hardware Modify functionality Leak secret information Assumptions Assumptions: Target device provides a high level of side channel(More)
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circuit foundries to covertly implant malicious hardware Trojans into a genuine design. Hardware Trojans provide back doors for on-chip manipulation, or leak secret information off-chip(More)
Throughput maximization of an adaptive transmission system with a finite number of transmitted power levels and code rates for communication over slow fading channels is analyzed based on the concept of information outage. Properties of throughput maximizing policies lead to an iterative algorithm that yields good system designs. Numerical results show that(More)
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depends on minute uncontrollable process variations, a low supply voltage can benefit PUFs by providing high sensitivity to variations and low power consumption as well. Motivated by(More)
Embedded cryptosystems show increased vulnerabilities to implementation attacks such as power analysis. CMOS technology trends are causing increased process variations which impact the data-dependent power of deep submicron cryptosystem designs. In this paper, we use Monte Carlo methods in SPICE circuit simulations to analyze the statistical properties of(More)
—Since the vulnerability of cryptosystems to differential power analysis (DPA) was reported in 1999, various power analysis attacks and corresponding countermeasures have been studied. With the scaling down of supply voltage and CMOS technology below 90nm, leakage power plays an increasing role in the overall power dissipation. Future cryptosystems need to(More)
—This work examines a transmission system which adapts a finite set of code rates and a continuously varying transmit power. We propose a technique for finding the average reliable throughput (ART)-maximizing policy satisfying an average power constraint for a slow fading additive white Gaussian noise (AWGN) channel. ART is a measure motivated by the(More)