Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software.
Jean-François GallaisJohann GroßschädlNeil HanleyMarkus KasperMarcel MedwedFrancesco RegazzoniJörn-Marc SchmidtStefan TillichMarcin WójcikPublished in: INTRUST (2010)
Keyphrases
- computer systems
- hardware design
- smart card
- hardware platforms
- personal computer
- random number generator
- low cost
- protection schemes
- software development
- embedded systems
- hardware and software
- industry standard
- control software
- computer hardware
- control unit
- software implementation
- blue gene
- hardware designs
- dedicated hardware
- hardware software
- computing platform
- real time
- software architecture
- computing systems
- hardware architecture
- user interface
- software systems
- commercial off the shelf
- software tools
- massively parallel
- high end
- java virtual machine
- hardware implementation
- software projects
- software components
- software design
- heterogeneous systems
- software engineering