Re: [cryptography] Stealthy Dopant-Level Hardware Trojans

2014-07-02 Thread David Johnston
Thank you. I like this paper, because its tied into the world of real semiconductor processing and diagnostic machines. The understanding of defenses and attacks against silicon requires an understanding of the capability of these machines and their use. What makes passive voltage contrast

Re: [cryptography] Stealthy Dopant-Level Hardware Trojans

2014-07-01 Thread Tony Arcieri
This went to the cypherpunks list, but not to the others: http://eprint.iacr.org/2014/508 Reversing stealthy dopant level trojans! ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

Re: [cryptography] Stealthy Dopant-Level Hardware Trojans

2014-06-26 Thread coderman
On Sun, Jun 22, 2014 at 2:49 AM, coderman coder...@gmail.com wrote: ... full URI to PDF for posterity: http://www.emsec.rub.de/media/crypto/veroeffentlichungen/2014/02/20/BeckerChes13.pdf one last note: it has been pointed out that this paper discusses one potential implementation of the

Re: [cryptography] Stealthy Dopant-Level Hardware Trojans

2014-06-22 Thread coderman
On Fri, Sep 13, 2013 at 2:49 AM, Eugen Leitl eu...@leitl.org wrote: ... http://people.umass.edu/gbecker/BeckerChes13.pdf Stealthy Dopant-Level Hardware Trojans ? Georg T. Becker1 this paper has disappeared from the net. any one have copies? (looking at you, JYA ;) [bonus points for

Re: [cryptography] Stealthy Dopant-Level Hardware Trojans

2014-06-22 Thread stef
On Sun, Jun 22, 2014 at 01:46:44AM -0700, coderman wrote: On Fri, Sep 13, 2013 at 2:49 AM, Eugen Leitl eu...@leitl.org wrote: ... http://people.umass.edu/gbecker/BeckerChes13.pdf Stealthy Dopant-Level Hardware Trojans ? Georg T. Becker1 this paper has disappeared from the net. any

Re: [cryptography] Stealthy Dopant-Level Hardware Trojans

2014-06-22 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 22/06/14 09:46, coderman wrote: On Fri, Sep 13, 2013 at 2:49 AM, Eugen Leitl eu...@leitl.org wrote: ... http://people.umass.edu/gbecker/BeckerChes13.pdf Stealthy Dopant-Level Hardware Trojans ? Georg T. Becker1 this paper has

Re: [cryptography] Stealthy Dopant-Level Hardware Trojans

2014-06-22 Thread coderman
On Sun, Jun 22, 2014 at 2:43 AM, Michael Rogers mich...@briarproject.org wrote: ... http://www.emsec.rub.de/research/publications/Hardware-Trojans/ ... PhD students suck at maintaining their web pages. ah well, :) full URI to PDF for posterity:

[cryptography] Stealthy Dopant-Level Hardware Trojans

2013-09-13 Thread Eugen Leitl
http://people.umass.edu/gbecker/BeckerChes13.pdf Stealthy Dopant-Level Hardware Trojans ? Georg T. Becker1 , Francesco Regazzoni2 , Christof Paar1,3 , and Wayne P. Burleson1 1University of Massachusetts Amherst, USA 2TU Delft, The Netherlands and ALaRI - University of Lugano, Switzerland