Research Directions for Verifiable Crypto-Physically Secure TEEs
S Bellemare - arxiv preprint arxiv:2410.03183, 2024 - arxiv.org
A niche corner of the Web3 world is increasingly making use of hardware-based Trusted
Execution Environments (TEEs) to build decentralized infrastructure. One of the motivations …
Execution Environments (TEEs) to build decentralized infrastructure. One of the motivations …
Leakyohm: Secret bits extraction using impedance analysis
The threats of physical side-channel attacks and their countermeasures have been widely
researched. Most physical side-channel attacks rely on the unavoidable influence of …
researched. Most physical side-channel attacks rely on the unavoidable influence of …
RandOhm: Mitigating Impedance Side-channel Attacks using Randomized Circuit Configurations
Physical side-channel attacks can compromise the security of integrated circuits. Most of the
physical side-channel attacks (eg, power or electromagnetic) exploit the dynamic behavior …
physical side-channel attacks (eg, power or electromagnetic) exploit the dynamic behavior …
PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels
P Ayoub, A Hernandez, R Cayre… - IACR …, 2025 - ojs.ub.ruhr-uni-bochum.de
In recent years, the limits of electromagnetic side-channel attacks have been significantly
expanded. However, while there is a growing literature on increasing attack distance or …
expanded. However, while there is a growing literature on increasing attack distance or …
Trojan insertion versus layout defenses for modern ICs: Red-versus-blue teaming in a competitive community effort
Hardware Trojans (HTs) are a longstanding threat to secure computation. Among different
threat models, it is the fabrication-time insertion of additional malicious logic directly into the …
threat models, it is the fabrication-time insertion of additional malicious logic directly into the …
BackMon: IC Backside Tamper Detection using On-Chip Impedance Monitoring
T Mosavirik, S Tajik - Proceedings of the 2024 Workshop on Attacks and …, 2024 - dl.acm.org
The expansion of flip-chip technologies and a lack of backside protection make the
integrated circuit (IC) vulnerable to certain classes of physical attacks mounted from the IC's …
integrated circuit (IC) vulnerable to certain classes of physical attacks mounted from the IC's …
Parasitic Circus: On the Feasibility of Golden Free PCB Verification
Printed circuit boards (PCBs) are an integral part of electronic systems. Hence, verifying their
physical integrity in the presence of supply chain attacks (eg, tampering and counterfeiting) …
physical integrity in the presence of supply chain attacks (eg, tampering and counterfeiting) …
Silicon Reverb: Non-Invasive Low-Cost Solution for Detecting Hardware Trojans
J Hong, S Ren - NAECON 2024-IEEE National Aerospace and …, 2024 - ieeexplore.ieee.org
This work introduces low-cost, non-invasive methods for detecting hardware trojans in Field
Programmable Gate Arrays (FPGAs) mounted on the increasingly popular system-on …
Programmable Gate Arrays (FPGAs) mounted on the increasingly popular system-on …