참고문헌
- Trusted Computing Group(TCG),"TPM Main Part1 Design Principles Specification Version 1.2", 2011.
- GlobalPlatform, "TEE System Architecture", (http:// www.globalplatform.org)
- GlobalPlatform, "TEE Internal API Specification", (http://www. globalplatform.org)
- GlobalPlatform, "TEE Client API Specification", (http://www. globalplatform.org)
- ARM,"ARM Security Technology-Building a Secure System using TrustZone Technology", (http://in focenter.arm.com/help/topic/com.arm.doc.prd29- genc-009492c/PRD29-GENC-009492C_trustzone_ security_whitepaper.pdf)
- Samsung, "Samsung Knox", (https://www. samsungknox.com/ko)
- P. Kocher, J. Jaffe and B. Jun, "Differential Power Analysis," CRYPTO '99, LNCS 1666, pp. 388-397, Springer-Verlag, 1999.
- C. Tarnovsky, "Deconstructing a 'Secure' Processor", Black Hat, Washington DC., (www.blackhat.com)
- Kamal, A.A. Youssef, A.M, "An-Area-optimized Implementation for AES with Hybrid Countermeasure against Power Analysis," ISSCS 2009, pp. 1-4, 2009.
- M. Joye, P. Paillier, and B. Schoenmaker, "On Second-Order Differential Power Analysis," CHES 2005, LNCS 3659, pp.293-308, 2005.
- A. Hevia, M. Kiwi, "Strength of two data encryption standard implementations under timing attacks," ACM Trans. on Information and System Security, Vol. 2, pp.416-437, 1999. https://doi.org/10.1145/330382.330390
-
D. D. Hwang, K. Tiri, A. Hodjat, B.-C. Lai, S. Yang, P. Schaumont, I. Verbauwhede, "AES-Based Security Coprocessor IC in 0.18-
$\mu{m}$ CMOS With Resistance to Differential Power Analysis Side-Channel Attacks," IEEE JOURNAL OF SOLID-STATE CIRCUITS, VOL. 41, NO. 4, pp. 781-791, 2006. https://doi.org/10.1109/JSSC.2006.870913 - K. Lofstrom, W.R. Daasch, and D. Taylor, "IC identification circuit using device mismatch," Solid- State Circuits Conference, 2000. Digest of Technical Papers. ISSCC. 2000 IEEE International, 2000.
- D. Lim, J.W. Lee, B. Gassend, G.E. Suh, M. Van Dijk, and S. Devadas, "Extracting secret keys from integrated circuits," Very Large Scale Integration (VLSI) Systems, IEEE Transactions on, VOL. 13, 2005.
- J. Guajardo, S.S. Kumar, G.-J. Schrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection," Cryptographic Hardware and Embedded Systems-CHES 2007, VOL. 4727, 2007.
- D. Roy, J. H. Klootwijk, N. Verhaegh, H. Roosen, and R. Wolters, "Comb capacitor structures for onchip physical uncloneable function," Semiconductor Manufacturing, IEEE Transactions on, VOL. 22, 2009.