Filters








119 Hits in 5.4 sec

Shaping the Glitch: Optimizing Voltage Fault Injection Attacks

Claudio Bozzato, Riccardo Focardi, Francesco Palmarini
<span title="2019-02-28">2019</span> <i title="IACR Transactions on Cryptographic Hardware and Embedded Systems"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yz7ssmvstjhsxiwixprnmyijnq" style="color: black;">Transactions on Cryptographic Hardware and Embedded Systems</a> </i> &nbsp;
Voltage fault injection is a powerful active side channel attack that modifies the execution-flow of a device by creating disturbances on the power supply line.  ...  We perform a thorough evaluation of arbitrary glitch waveforms by comparing the attack performance against two other major V-FI techniques in the literature.  ...  There exist multiple techniques for generating and injecting a voltage glitch into the power supply line of the target device.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tches.v2019.i2.199-224">doi:10.13154/tches.v2019.i2.199-224</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/tches/BozzatoFP19.html">dblp:journals/tches/BozzatoFP19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xayinsq2ajgj3bwczer6ti25wa">fatcat:xayinsq2ajgj3bwczer6ti25wa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200109211602/https://tches.iacr.org/index.php/TCHES/article/download/7390/6562" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4c/01/4c01a7514deacc2c02d010bb14c4fb58d1712adc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tches.v2019.i2.199-224"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

DeepStrike: Remotely-Guided Fault Injection Attacks on DNN Accelerator in Cloud-FPGA [article]

Yukui Luo, Cheng Gongye, Yunsi Fei, Xiaolin Xu
<span title="2021-05-20">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
This work investigates the integrity of DNN FPGA accelerators in clouds. It proposes DeepStrike, a remotely-guided attack based on power glitching fault injections targeting DNN execution.  ...  We characterize the vulnerabilities of different DNN layers against fault injections on FPGAs and leverage time-to-digital converter (TDC) sensors to precisely control the timing of fault injections.  ...  It is a malicious controllable power-wasting circuit used for aggressively overloading the shared PDN, incurring well-timed voltage glitches.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2105.09453v1">arXiv:2105.09453v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nuvh5lzvwzb3th5m4x253ulyku">fatcat:nuvh5lzvwzb3th5m4x253ulyku</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210603093307/https://arxiv.org/pdf/2105.09453v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bb/08/bb0898e44d0df9ee72f77aa016c1027ed15aaced.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2105.09453v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Detecting Electromagnetic Injection Attack on FPGAs Using In-situ Timing Sensors

Surabhi Satyajit Gujar, Leyla Nazhandali
<span title="2020-06-16">2020</span> <i title="Springer Science and Business Media LLC"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/qegv3ly7vffgbnwqhz2hqoueu4" style="color: black;">Journal of Hardware and Systems Security</a> </i> &nbsp;
Nowadays, security is one of the foremost concerns as the confidence in a system is mostly dependent on its ability to protect itself against any attack.  ...  Apart from the software attacks, it is possible for an attacker to disrupt or control the functioning of a system by physically attacking its hardware using various techniques.  ...  A clock glitch fault injection is one of the simplest and cheapest ways of injecting faults in a circuit. • Voltage glitching: These attacks involve increasing the voltage of the target embedded device  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s41635-020-00096-9">doi:10.1007/s41635-020-00096-9</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/g5pu6spcmzastg5gczu3ls62qi">fatcat:g5pu6spcmzastg5gczu3ls62qi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200319200331/https://vtechworks.lib.vt.edu/bitstream/handle/10919/97006/Gujar_SS_T_2018.pdf;jsessionid=9FF79B32E9922869ED26F8C36F57188F?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ee/63/ee635eecbecd18f797f41224324dd69e1d7a6e04.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s41635-020-00096-9"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Fault Injection as an Oscilloscope: Fault Correlation Analysis

Albert Spruyt, Alyssa Milburn, Łukasz Chmielewski
<span title="2020-12-03">2020</span> <i title="Universitatsbibliothek der Ruhr-Universitat Bochum"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yz7ssmvstjhsxiwixprnmyijnq" style="color: black;">Transactions on Cryptographic Hardware and Embedded Systems</a> </i> &nbsp;
We impose only the requirements of the equivalent SCA attack (e.g., knowledge of the input plaintext for CPA on the first round), along with a way to observe the status of the target (whether or not it  ...  Such attacks have recently focused more on exploitation of implementation-centric and device-specific properties of the faults.  ...  Acknowledgements We would like to thank Cees-Bart Breunesse for his help with the JLsca framework, and the anonymous reviewers for their valuable feedback.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46586/tches.v2021.i1.192-216">doi:10.46586/tches.v2021.i1.192-216</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mlspidbv4rba7j76jk234xdvsi">fatcat:mlspidbv4rba7j76jk234xdvsi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201205221859/https://tches.iacr.org/index.php/TCHES/article/download/8732/8332" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9c/14/9c14bfbb26b3cdab84983adbbb2986539b5de1c6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46586/tches.v2021.i1.192-216"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Design and Implementation of a New Real-Time Frequency Sensor Used as Hardware Countermeasure

Raúl Jiménez-Naharro, Juan Gómez-Galán, Manuel Sánchez-Raya, Fernando Gómez-Bravo, Manuel Pedro-Carrasco
<span title="2013-09-04">2013</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/taedaf6aozg7vitz5dpgkojane" style="color: black;">Sensors</a> </i> &nbsp;
This countermeasure, known as frequency sensor, consists of a local oscillator, a transition detector, a measurement element and an output block.  ...  Finally, a counter has been used to verify the good performance of the countermeasure in avoiding the success of an attack.  ...  Conflicts of Interest The authors declare no conflict of interest. References  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s130911709">doi:10.3390/s130911709</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/24008285">pmid:24008285</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC3821354/">pmcid:PMC3821354</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hcdk3ne7kng5vgpk5uajtsfx74">fatcat:hcdk3ne7kng5vgpk5uajtsfx74</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151204184354/http://www.mdpi.com/1424-8220/13/9/11709/pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/70/90/70904b2f76fd20be56855013c33ed5a073e2de6a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s130911709"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3821354" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

The Sorcerer's Apprentice Guide to Fault Attacks

H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, C. Whelan
<span title="">2006</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yfvtieuumfamvmjlc255uckdlm" style="color: black;">Proceedings of the IEEE</a> </i> &nbsp;
Several examples of attacks stemming from the exploiting of faults are explained. Finally a series of countermeasures to thwart these attacks are described.  ...  Since then various mechanisms for fault creation and propagation have been discovered and researched.  ...  Active Protections: • Light detectors detect changes in the gradient of light. • Supply voltage detectors react to abrupt variations in the applied potential and continuously ascertain that voltage is  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jproc.2005.862424">doi:10.1109/jproc.2005.862424</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/djg7jmfjxbdjbpm3mehfbjqjtu">fatcat:djg7jmfjxbdjbpm3mehfbjqjtu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120117044135/http://eprint.iacr.org/2004/100.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9d/d1/9dd15f3ff339de35865c3230211abf797c8814e5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jproc.2005.862424"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Foundations of Secure Scaling (Dagstuhl Seminar 16342)

Lejla Batina, Swarup Bhunia, Patrick Schaumont, Jean-Pierre Seifert, Marc Herbstritt
<span title="2017-01-04">2017</span> <i title="Schloss Dagstuhl Leibniz-Zentrum für Informatik GmbH"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/u2phfyhrhje7xnnubtp3vfklcu" style="color: black;">Dagstuhl Reports</a> </i> &nbsp;
While scaling is generally thought of as beneficial to the resulting implementations, this does not hold for secure electronic design.  ...  This report documents the program and the outcomes of Dagstuhl Seminar 16342 "Foundations of Secure Scaling".  ...  We would like to evaluate the physical security of crypto across integration and technology. We consider two cases: 1. cache attacks ,2. fault injection attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4230/dagrep.6.8.65">doi:10.4230/dagrep.6.8.65</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/dagstuhl-reports/BatinaBSS16.html">dblp:journals/dagstuhl-reports/BatinaBSS16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qya6rznvonbi7pfic7ocbxwkea">fatcat:qya6rznvonbi7pfic7ocbxwkea</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220123034338/https://drops.dagstuhl.de/opus/volltexte/2017/6838/pdf/dagrep_v006_i008_p065_s16342.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8d/03/8d03476f48285cac41cf9aa16332c8c4c0b22b20.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4230/dagrep.6.8.65"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

No Place to Hide: Contactless Probing of Secret Data on FPGAs [chapter]

Heiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert
<span title="">2016</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
To the best of our knowledge this is the first time that LVP is used to perform an attack on secure ICs.  ...  In this paper, however, novel approaches have been explored: Attacks based on Laser Voltage Probing (LVP) and its derivatives, as commonly used in Integrated Circuit (IC) debug for nanoscale low voltage  ...  This research was supported by the German Federal Ministry of Education and Research in the project Photon FX 2 and by the Helmholtz Research School on Security Technologies.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53140-2_8">doi:10.1007/978-3-662-53140-2_8</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/h7xcjzb3arh4ffgqvpd243ctoe">fatcat:h7xcjzb3arh4ffgqvpd243ctoe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170711045201/http://eprint.iacr.org/2016/593.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6a/69/6a69c10fdfb819dbf0c45075ac570704ada41d57.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53140-2_8"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attack [article]

Yuan Yao, Pantea Kiaei, Richa Singh, Shahin Tajik, Patrick Schaumont
<span title="2021-06-25">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Circuit-level countermeasures help to deter these attacks, and traditionally such countermeasures have been developed for each attack vector separately.  ...  PRO, as an integrated primitive, can provide on-chip side-channel resistance, power monitoring, and fault detection capabilities to a secure design.  ...  A characterization procedure, therefore, is needed to define the range of normal operation [3] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2106.13784v1">arXiv:2106.13784v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/55un7lnnd5hdbbc6ewmisau6ia">fatcat:55un7lnnd5hdbbc6ewmisau6ia</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210630053824/https://arxiv.org/pdf/2106.13784v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c2/4a/c24a044bb10df26f1b30e462ae3b45bedac61580.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2106.13784v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Defense Mechanisms against Machine Learning Modeling Attacks on Strong Physical Unclonable Functions for IOT Authentication: A Review

Nur Qamarina, Salwani Mohd, Noor Azurati, Nurazean Maarop
<span title="">2017</span> <i title="The Science and Information Organization"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2yzw5hsmlfa6bkafwsibbudu64" style="color: black;">International Journal of Advanced Computer Science and Applications</a> </i> &nbsp;
Security component in IoT system are very crucial because the devices within the IoT system are exposed to numerous malicious attacks.  ...  devices.  ...  ACKNOWLEDGMENT We would like to express our gratitude to Ministry of Higher Education (MOHE Malaysia) for providing financial support (research grant Q.K130000.2538.11H85) in conducting our study.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2017.081018">doi:10.14569/ijacsa.2017.081018</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pqtg7qmfc5de3osv4hyxsbragm">fatcat:pqtg7qmfc5de3osv4hyxsbragm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721073200/http://thesai.org/Downloads/Volume8No10/Paper_18-Defense_Mechanisms_against_Machine_Learning_Modeling_Attacks.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/69/8e/698e90f67f5cd1a222f57789962f9f9edfd187ed.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2017.081018"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A Smart Sensor for Defending against Clock Glitching Attacks on the I2C Protocol in Robotic Applications

Raúl Jiménez-Naharro, Fernando Gómez-Bravo, Jonathan Medina-García, Manuel Sánchez-Raya, Juan Gómez-Galán
<span title="2017-03-25">2017</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/taedaf6aozg7vitz5dpgkojane" style="color: black;">Sensors</a> </i> &nbsp;
of the proposed defending device.  ...  This paper aims to discuss the possibility of attacking a robotic system by interfering with the clock signal of the I2C protocol and proposes a defense strategy for this attack.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s17040677">doi:10.3390/s17040677</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/28346337">pmid:28346337</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC5419790/">pmcid:PMC5419790</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/k225hzr2lvfbndc2psu2iaebsm">fatcat:k225hzr2lvfbndc2psu2iaebsm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190227093001/http://pdfs.semanticscholar.org/7dee/36de0e056a7e5ce8cfd1ccb83799620e28aa.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7d/ee/7dee36de0e056a7e5ce8cfd1ccb83799620e28aa.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s17040677"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5419790" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Side-channel leakage from sensor-based countermeasures against fault injection attack

Takeshi Sugawara, Natsu Shoji, Kazuo Sakiyama, Kohei Matsuda, Noriyuki Miura, Makoto Nagata
<span title="">2019</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/j4boqfodxvd6baghfcgla24jdy" style="color: black;">Microelectronics Journal</a> </i> &nbsp;
In this paper, we give the first security evaluation of the bit-flip detector. We show that an attacker can reveal an internal state by observing how the sensor reacts to laser fault injection.  ...  The leakage leads to a variant of probing attack that is feasible non-invasively. We also propose a new cryptanalytic technique that efficiently exploit the leakage to attack AES.  ...  Acknowledgement We thank the anonymous reviewers for their valuable comments. The study is supported by JSPS KAKENHI Grant Number JP18H05289 and JP18K18047.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.mejo.2019.05.017">doi:10.1016/j.mejo.2019.05.017</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rgnxa7rvj5e5phuncnka2pn24m">fatcat:rgnxa7rvj5e5phuncnka2pn24m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200506130609/http://www.lib.kobe-u.ac.jp/repository/90006267.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/23/cb/23cba150ec10b44baf506b91f8cc2fe93cda5c0e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.mejo.2019.05.017"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Hardware Designer's Guide to Fault Attacks

Dusko Karaklajic, Jorn-Marc Schmidt, Ingrid Verbauwhede
<span title="">2013</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/uqbr2omxsbdgtaxslmblka2nnu" style="color: black;">IEEE Transactions on Very Large Scale Integration (vlsi) Systems</a> </i> &nbsp;
The result of this work is a guide for selecting a set of countermeasures which provides a sufficient security level to meet the constraints of the embedded devices.  ...  We analyze fault attacks from different aspects and expose the mechanisms they employ to reveal a secret parameter of a device.  ...  Since there is no established strategy for securing a design against fault attacks, a designer can easily overlook protection against a relevant attack, thus lowering the security level of the device.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tvlsi.2012.2231707">doi:10.1109/tvlsi.2012.2231707</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4mhbkwfw3jgttptpc6ck5czwba">fatcat:4mhbkwfw3jgttptpc6ck5czwba</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829211340/https://lirias.kuleuven.be/bitstream/123456789/395845/3/article-2204.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/29/64/29646cb9cab1f904c22736741110b6f4648d4ecf.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tvlsi.2012.2231707"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

The Low Area Probing Detector as a Countermeasure Against Invasive Attacks

Michael Weiner, Salvador Manich, Rosa Rodriguez-Montanes, Georg Sigl
<span title="">2018</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/uqbr2omxsbdgtaxslmblka2nnu" style="color: black;">IEEE Transactions on Very Large Scale Integration (vlsi) Systems</a> </i> &nbsp;
This makes it a commonly used attack technique against security-related semiconductors, such as smart card controllers.  ...  We show the Monte Carlo simulation results of mismatch variations as well as process, voltage, and temperature corners on a 65-nm technology and present a simple reliability optimization.  ...  Glitch detectors as well as temperature and light sensors were added to detect fault attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tvlsi.2017.2762630">doi:10.1109/tvlsi.2017.2762630</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dmzgnrieefanncsklw64ibhyly">fatcat:dmzgnrieefanncsklw64ibhyly</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180719094013/https://upcommons.upc.edu/bitstream/handle/2117/111056/08097013.pdf;jsessionid=9F74109036EC4EF7ABB47F94D0F60A26?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c3/f9/c3f90a7efe2a76ead7cbeb9f8b72721e3eef7caf.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tvlsi.2017.2762630"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

An energy/security scalable encryption processor using an embedded variable voltage DC/DC converter

J. Goodman, A.P. Dancy, A.P. Chandrakasan
<span title="">1998</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cz5rf4o3ezafnl4kjpq643g32e" style="color: black;">IEEE Journal of Solid-State Circuits</a> </i> &nbsp;
Security concerns for battery-operated wireless systems require the development of energy-efficient data-encryption techniques that can adapt to the time-varying data rates and quality-of-service requirements  ...  This work describes the design and implementation of a configurable encryption processor that allows the security provided to be traded off with respect to the energy that is dissipated to encrypt a bit  ...  Hence, an attacker is forced continually to restart their attack at the beginning of each initialization period, and the amount of data exposed for any given successful attack is minimized.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/4.726580">doi:10.1109/4.726580</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hau4u5e3p5gy7kmpthvru64dbi">fatcat:hau4u5e3p5gy7kmpthvru64dbi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20041224100728/http://www-mtl.mit.edu:80/research/icsystems/pubs/journals/1998_goodman_jssc.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3b/c9/3bc905d9052ef24d1d55eef649a6118acb7af9c9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/4.726580"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 119 results