Publications & Deliverables
Publications
2016
New Partitioning Approach for Hardware Trojan Detection Using Side-Channel Measurements
K. M. Abdellatif, C. Cornesse, J. Fournier and B. Robisson, accepted at ARC 2016 (International workshop on Applied Reconfigurable Computing), March 2016.
On-chip fingerprinting of IC topology for integrity verification
M. Lecomte, J.J.A. Fournier and P. Maurine, to appear in proceedings of DATE 2016, Dresden, Germany, March 2016.
2015
Thoroughly analyzing the use of Ring Oscillators for on-chip Hardware Trojan detection
M. Lecomte, J. Fournier and P. Maurine, In 2015 International Conference on ReConFigurable Computing and FPGAs, IEEE, 6 pages, 2015.
Quality Limitations on the Extraction of a PUF-based Cryptographic Key
S. Lattacher, M. Deutschmann, M. Höberl, C. Petschnigg, N. Safari, in Conference Proceedings, 2015.
Resilient Hardware Trojans Detection based on Path Delay Measurements
I.Exurville, Z.Loïc, J.B.Rigaud, B.Robisson, in IEEE, 2015.
A Survey on Lightweight Entity Authentication with Strong PUFs
J.Delvaux, R.Peeters, D.Gu, I.Verbauwhede, in ACM Computing Surveys, 2015.
Success Stories of FP7 ICT Trust & Security Projects
The HINT project has been identified as "Success Story" in ICT Security and Trust by the FP7 project “SecCOrd”.
Electromagnetic Circuit Fingerprints for Hardware Trojan Detection
J.Balasch, B.Gierlichs, I.Verbauwhede, in IEEE International Symposium on Electromagnetic Compatibility, 6 pages, 2015.
2014
Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis
J. Delvaux, D. Gu, D. Schellekens, I. Verbauwhede, in IEEE Transaction on Computer Aided Design, 14 pages, 2014.
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?
J. Delvaux, D. Gu, D. Schellekens, I. Verbauwhede, in Chinacrypt 2014, 18 pages, 2014.
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?
J. Delvaux, D. Gu, D. Schellekens, I. Verbauwhede, in CHES 2014, 18 pages, 2014.
Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation
J. Delvaux, I. Verbauwhede, in CT-RSA, Springer, 26 pages, 2014.
Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation
J. Delvaux, I. Verbauwhede, in DATE, 6 pages, 2014.
Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes
J. Delvaux, I. Verbauwhede, in IEEE Transactions on circuits and systems, 13 pages, 2014.
2013
Research and Innovation Yearbook 2013
The HINT Consortium contributed to the Research and Innovation Yearbook 2013 (deliverable of the FP7 project "SecCOrd".
Side Channel Modeling Attacks on 65nm Arbiter PUFs Exploiting CMOS Device Noise
J. Delvaux, and I. Verbauwhede, In 6th IEEE International Symposium on Hardware-Oriented Security and Trust - HOST 2013, IEEE, 6 pages, 2013.
Public Deliverables
Project Period 2
D 2.1 Report on novel cell and architecture concepts based on technology dependent research
D 3.1 Report on Protocol choice and implementation
Project Period 1
D 1.1 Report on use case and architecture requirements
D 1.2 Report on specifications and overall architecture
D 6.1 Project website and internal IT communication infrastructure
D 6.2 Initial report on project dissemination, exploitation and standardisation
Newsletter
August 2015
HINT-Newsletter 2015 (Issue 5)
November 2014
HINT-Newsletter 2014 (Issue 4)
June 2014
HINT-Newsletter 2014 (Issue 3)
January 2014
HINT-Newsletter 2014 (Issue 2)
September 2013
HINT-Newsletter 2013 (Issue 1)
Press releases
March 2016
January 2013
Other Publications
February 2013