A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Stratification of Hardware Attacks: Side Channel Attacks and Fault Injection Techniques
2021
SN Computer Science
Cryptographic devices have many encrypted and secured solutions to protect them against hardware attacks. ...
Keywords Side channel attacks (SCA) • Fault injection attacks (FIA) • Fault analysis techniques • Power glitch attacks • Spectre attack • Hardware Trojan This article is part of the topical collection ...
Propagation delays change timing properties of CMOS devices [56] Clock glitch attack Highly accurate clock glitch genera- tor is proposed on AES. ...
doi:10.1007/s42979-021-00562-3
fatcat:axqbbvgqarhnvo22ac4cdwhcby
The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs
[article]
2021
arXiv
pre-print
Glitching the supply voltage can cause data value corruption, skip security checks, or enable protected code paths. ...
Since these embedded devices are often physically accessible by attackers, vendors must consider device tampering in their threat models. ...
One could try to detect malicious voltage drops/glitches, and as a consequence, shut down the system to prevent further damage. ...
arXiv:2108.06131v2
fatcat:7oor7ezryrbevksuyjxa5zhjnm
Machine Learning Methods to Detect Voltage Glitch Attacks on IoT/IIoT Infrastructures
2022
Computational Intelligence and Neuroscience
One of the most dangerous attacks of this type is voltage glitch attacks (VGAs), which can change the intended behavior of a system. ...
This study proposes an innovative VGAs detection system based on advanced machine learning. ...
Side-channel attacks, fault attacks, optical fault injection, electromagnetic fault injection, clock/voltage glitch, and other examples of this sort of attack vary depending on the medium utilized. [13 ...
doi:10.1155/2022/6044071
pmid:35515505
pmcid:PMC9064520
fatcat:3xcnx2lwgbfenhzeroowqlaimi
A Review on Evaluation and Configuration of Fault Injection Attack Instruments to Design Attack Resistant MCU-Based IoT Applications
2020
Electronics
Fault attacks are the noticeable type of physical attacks, in which the normal and secure behavior of the targeted devices is liable to be jeopardized. ...
Two of the primary means of fault attacks are clock and voltage fault injection. ...
Moreover, they are the most used techniques in attacks against IoT devices with medium security. ...
doi:10.3390/electronics9071153
fatcat:v7besqcahjgbrbtgndlxglwcuq
Shaping the Glitch: Optimizing Voltage Fault Injection Attacks
2019
Transactions on Cryptographic Hardware and Embedded Systems
Voltage fault injection is a powerful active side channel attack that modifies the execution-flow of a device by creating disturbances on the power supply line. ...
Among the presented attacks, the most challenging ones exploit multiple vulnerabilities and inject over one million glitches, heavily leveraging on the performance and repeatability of the new proposed ...
Security mechanisms. The bootloader offers a security mechanism to lock the device and prevent any read or write operations on the flash memory. ...
doi:10.13154/tches.v2019.i2.199-224
dblp:journals/tches/BozzatoFP19
fatcat:xayinsq2ajgj3bwczer6ti25wa
Voltage regulator assisted lightweight countermeasure against fault injection attacks
[article]
2020
arXiv
pre-print
The robustness of a CC against voltage glitch attacks increases with an on-chip voltage regulator that considers the impact of topology and component selection on the fault injection robustness. ...
Using the infective countermeasure for fault resiliency, the security-enhanced CC provides a robust and resilient solution against fault attacks that improve the security and availability of the device ...
Similarly, the attacker comprehends that if the injected glitch voltage is too high for the CMOS device of the CC, the device will breakdown. ...
arXiv:2001.03230v1
fatcat:fjl3o4tklbejtij2vp6hsel2be
Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection
[chapter]
2014
Lecture Notes in Computer Science
With this approach we found some of off-the-shelf devices, although secured against this type of attacks, still vulnerable. ...
Fault analysis poses a serious threat to embedded security devices, especially smart cards. ...
Namely, we distinguish between two phases for glitching, one focusing on voltage parameters and the other one on proper timing. ...
doi:10.1007/978-3-319-14123-7_16
fatcat:iym4imna5rcthoa2q3loobhkdy
Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection
[chapter]
2014
Lecture Notes in Computer Science
With this approach we found some of off-the-shelf devices, although secured against this type of attacks, still vulnerable. ...
Fault analysis poses a serious threat to embedded security devices, especially smart cards. ...
Namely, we distinguish between two phases for glitching, one focusing on voltage parameters and the other one on proper timing. ...
doi:10.1007/978-3-319-08302-5_16
fatcat:hyr5fb6mojfenb4jk7fjuqgmtu
Hardware Security Evaluation of MAX 10 FPGA
[article]
2019
arXiv
pre-print
This paper shows preliminary evaluation of hardware security in Intel MAX 10 devices. ...
Its purpose is to highlight the most vulnerable areas to attacks aimed at data extraction and reverse engineering. That way further investigations could be performed on specific areas of concern. ...
Intel was notified about the existence of vulnerabilities in MAX 10 devices via secure@intel.com. ...
arXiv:1910.05086v1
fatcat:lyheijgy5jhmtfteaknzbmfj64
Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis
2020
Transactions on Cryptographic Hardware and Embedded Systems
multi-glitch attack on a real-world target; 3) we apply symbolic execution to precisely aim voltage glitches at target instructions based on the execution path in the bootloader of the Renesas 78K0 automotive ...
glitching to develop a powerful attack methodology against embedded bootloaders. ...
Thus, however strong security primitives a specific system is built on, a vulnerable bootloader undoes all of this and makes the device susceptible to various attacks ranging from firmware readout to a ...
doi:10.46586/tches.v2021.i1.56-81
fatcat:tzychvibcfaejcj23kdiwbqmkm
Fault Attacks on Secure Embedded Software: Threats, Design and Evaluation
[article]
2020
arXiv
pre-print
This article is a review on hardware-based fault attacks on software, with emphasis on the context of embedded systems. ...
However, we emphasize that improvements to countermeasures often build on insight into the attacks. ...
ACKNOWLEDGEMENTS The authors would like to thank Dennis Vermoen from Riscure Security Lab for his help and support. ...
arXiv:2003.10513v1
fatcat:paebhdl4cjhfvp7o5skttooyym
Electrochemical Behavior and Analytical Applications of Electronically Type-Sorted Carbon Nanotube Electrode
2016
Sensors and materials
The objective of the proposed secure circuit with an on-chip temperature sensor is to detect temperature-based fault injection attacks and protect the secure contents of the target device. ...
Keywords: secure circuit, hardware security, physical attack protection, fault injection attacks, temperature fault injection attacks In this paper, we present a secure circuit with a low-power on-chip ...
The objective of the proposed secure circuit with the on-chip temperature sensor is to detect the temperature-based fault injection attacks and protect the secure contents of the target device. ...
doi:10.18494/sam.2016.1157
fatcat:oaspb6heivgmdbuuhgvpoubhpu
Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms
[chapter]
2016
Lecture Notes in Computer Science
Mukhopadhyay
Fault Injection Attacks
13 / 37
• Glitches effect are short-lived. ...
on range of devices
+ Low expertise required
-Limited precision
• Local
+ Precise and powerful
+ Can bypass basic protections
-High expertise required
-Expensive equipments
• • • Potential for ...
Static Device ...
doi:10.1007/978-3-319-49445-6_24
fatcat:7xlppx3hljcs7f6ppglqz2wyyq
A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices
[chapter]
2010
Lecture Notes in Computer Science
Our proposed low-cost setup consists of modular functional units that can be interchanged, depending on the demands of a concrete attack scenario. ...
We present a unified framework for advanced implementation attacks that allows for conducting automated side-channel analysis and fault injection targeting all kinds of embedded cryptographic devices including ...
glitch voltage level V low, 2 . ...
doi:10.1007/978-3-642-17499-5_5
fatcat:yd7vx5jw5vh2boctlr2z2hjxcm
One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization
[article]
2021
arXiv
pre-print
We present a voltage glitching attack that allows an attacker to execute custom payloads on the AMD-SPs of all microarchitectures that support SEV currently on the market (Zen 1, Zen 2, and Zen 3). ...
To separate security-sensitive operations from software executing on the main x86 cores, SEV leverages the AMD Secure Processor (AMD-SP). ...
RELATED WORK Voltage glitching attacks targeting security-sensitive operations on CPUs have been subject to extensive analysis in the past. ...
arXiv:2108.04575v4
fatcat:zmj2cww5dzb4djki5jzckbgfhm
« Previous
Showing results 1 — 15 out of 626 results