Browse > Article

하드웨어 칩 기반 보안시스템 및 해킹동향  

Choe, Pil-Ju (한양대학교)
Choe, Won-Seop (한양대학교)
Kim, Dong-Gyu (한양대학교)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. Kocher, J. Jaffe and B. Jun, "Differential Power Analysis," CRYPTO '99, LNCS 1666, pp. 388-397, Springer-Verlag, 1999.
2 C. Tarnovsky, "Deconstructing a 'Secure' Processor", Black Hat, Washington DC., (www.blackhat.com)
3 Kamal, A.A. Youssef, A.M, "An-Area-optimized Implementation for AES with Hybrid Countermeasure against Power Analysis," ISSCS 2009, pp. 1-4, 2009.
4 M. Joye, P. Paillier, and B. Schoenmaker, "On Second-Order Differential Power Analysis," CHES 2005, LNCS 3659, pp.293-308, 2005.
5 A. Hevia, M. Kiwi, "Strength of two data encryption standard implementations under timing attacks," ACM Trans. on Information and System Security, Vol. 2, pp.416-437, 1999.   DOI
6 D. D. Hwang, K. Tiri, A. Hodjat, B.-C. Lai, S. Yang, P. Schaumont, I. Verbauwhede, "AES-Based Security Coprocessor IC in 0.18-$\mu{m}$ CMOS With Resistance to Differential Power Analysis Side-Channel Attacks," IEEE JOURNAL OF SOLID-STATE CIRCUITS, VOL. 41, NO. 4, pp. 781-791, 2006.   DOI
7 K. Lofstrom, W.R. Daasch, and D. Taylor, "IC identification circuit using device mismatch," Solid- State Circuits Conference, 2000. Digest of Technical Papers. ISSCC. 2000 IEEE International, 2000.
8 D. Lim, J.W. Lee, B. Gassend, G.E. Suh, M. Van Dijk, and S. Devadas, "Extracting secret keys from integrated circuits," Very Large Scale Integration (VLSI) Systems, IEEE Transactions on, VOL. 13, 2005.
9 J. Guajardo, S.S. Kumar, G.-J. Schrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection," Cryptographic Hardware and Embedded Systems-CHES 2007, VOL. 4727, 2007.
10 D. Roy, J. H. Klootwijk, N. Verhaegh, H. Roosen, and R. Wolters, "Comb capacitor structures for onchip physical uncloneable function," Semiconductor Manufacturing, IEEE Transactions on, VOL. 22, 2009.
11 Trusted Computing Group(TCG),"TPM Main Part1 Design Principles Specification Version 1.2", 2011.
12 GlobalPlatform, "TEE System Architecture", (http:// www.globalplatform.org)
13 GlobalPlatform, "TEE Internal API Specification", (http://www. globalplatform.org)
14 GlobalPlatform, "TEE Client API Specification", (http://www. globalplatform.org)
15 ARM,"ARM Security Technology-Building a Secure System using TrustZone Technology", (http://in focenter.arm.com/help/topic/com.arm.doc.prd29- genc-009492c/PRD29-GENC-009492C_trustzone_ security_whitepaper.pdf)
16 Samsung, "Samsung Knox", (https://www. samsungknox.com/ko)