Robustness analysis of crosstalk-based hardware Trojans and relevant algorithms to nonideal positioning

2017 Asia-Pacific International Symposium on Electromagnetic Compatibility (APEMC)(2017)

引用 0|浏览1
暂无评分
摘要
In a previous work, the possibility to eavesdrop digital signals transmitted along differential interconnects was explored by resorting to sensing loop(s), operated as hardware Trojans placed in close proximity of the data lines. To maximize coupling, ideal (i.e., symmetric) positioning of the receiving loop(s) with respect to the differential interconnect was considered. However, since in practice misalignment between the two circuits may occur, this work investigates robustness of the eavesdropping algorithms to possible geometrical deviations from the ideal (symmetric) configuration. Here, the objective is to assess accuracy of the proposed methods in reconstructing the original waveforms even in case of nonideal positioning of the receiving loop(s).
更多
查看译文
关键词
Crosstalk,Information leakage,Differential Interconnects
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要