66 Hits in 5.2 sec

Electromagnetic Fault Injection as a New Forensic Approach for SoCs

Clement Gaine, Driss Aboulkassimi, Simon Pontie, Jean-Pierre Nikolovski, Jean-Max Dutertre
2020 2020 IEEE International Workshop on Information Forensics and Security (WIFS)  
Hence, this work constitutes a step towards smartphones privilege escalation through electromagnetic fault injection. This approach is interesting for addressing forensic issues on smartphones.  ...  Electromagnetic fault injection is such a technique usually used for microcontrollers or FPGA security characterization.  ...  As the objective of this article is to present a new approach for forensic, we also suggested some use cases.  ... 
doi:10.1109/wifs49906.2020.9360902 fatcat:ventzgqg6zaobe7gdvqv5fb7lm

Electromagnetic fault injection against a System-on-Chip, toward new micro-architectural fault models [article]

Thomas Trouchkine, Sébanjila Kevin Bukasa, Mathieu Escouteloup, Ronan Lashermes, Guillaume Bouffard
2019 arXiv   pre-print
Electromagnetic fault injection (EMFI) is a well known technique used to disturb the behaviour of a chip for weakening its security. These attacks are mostly done on simple microcontrollers.  ...  In this paper, we propose an experimental setup and a forensic process to create exploitable faults and assess their impact on the SoC micro-architecture.  ...  In this paper, we propose an electromagnetic fault injection (EMFI) attack against a SoC. Electromagnetic pulses modify the electric signals in the metallic chip wires.  ... 
arXiv:1910.11566v1 fatcat:74sr3ans2bfpnlr4ftsm63njbq

Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis [article]

Carlton Shepherd, Konstantinos Markantonakis, Nico van Heijningen, Driss Aboulkassimi, Clément Gaine, Thibaut Heckmann, David Naccache
2021 arXiv   pre-print
In parallel, sophisticated SoC-assisted security mechanisms have become commonplace for protecting device data, such as trusted execution environments, full-disk and file-based encryption.  ...  In total, we comprehensively survey over 50 fault injection and side-channel attack papers published between 2009-2021.  ...  The authors would like to thank the EXFILES WP5 project partners for comments and discussions around the topic of this work.  ... 
arXiv:2105.04454v5 fatcat:27ldfag7ejgvxh7cbs2qnevb24

Real-Time Frequency Detection to Synchronize Fault Injection on System-on-Chip [article]

Clément Fanjas, Clément Gaine, Driss Aboulkassimi, Simon Pontié, Olivier Potin
2022 IACR Cryptology ePrint Archive  
By triggering the attack upon the activation of a frequency at 124.5 MHz during a RSA signature computation, we were able to synchronize an electromagnetic fault injection to skip a vulnerable instruction  ...  For validating the proof-of-concept of this new triggering methodology, this paper presents an exploitation of the SFD concept against the Android Secure-Boot of a smartphone-grade SoC.  ...  This approach will be certainly used in future work for synchronizing hardware characterization methods against other targets such as new SoC references or other Secure-Boots.  ... 
dblp:journals/iacr/FanjasGAPP22 fatcat:w5icw6pgvnbxfgh5bhhudj2nim

A new model for forensic data extraction from encrypted mobile devices

Aya Fukami, Radina Stoykova, Zeno Geradts
2021 Forensic Science International: Digital Investigation  
A new model for forensic acquisition is proposed. The model is supported by a legal framework focused on the usability of digital evidence obtained through vulnerability exploitation.  ...  This trend makes forensic acquisition harder than before, and data extraction from those devices for criminal investigation is becoming a more challenging task.  ...  Examples of fault injection techniques are glitching or underfeeding the power supply, transmission of electromagnetic signals, and injecting optical beams.  ... 
doi:10.1016/j.fsidi.2021.301169 fatcat:oai5gawb6fe63cxmfpj3ub6d6e

Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption [chapter]

Thomas Unterluggauer, Stefan Mangard
2016 Lecture Notes in Computer Science  
and Differential Fault Analysis (DFA).  ...  As these may pose a threat to memory confidentiality, this paper investigates contemporary memory and disk encryption schemes and their implementations with respect to Differential Power Analysis (DPA)  ...  Various techniques to inject faults into a device exist, e.g., power and clock glitches, laser shots, and electromagnetic pulses.  ... 
doi:10.1007/978-3-319-43283-0_1 fatcat:fqfnymtubffxtgk3wqo5bj46zq

Hardware Security in IoT Devices with Emphasis on Hardware Trojans

Simranjeet Sidhu, Bassam J. Mohd, Thaier Hayajneh
2019 Journal of Sensor and Actuator Networks  
This paper emphasizes the need for a secure hardware-level foundation for security of these devices, as depending on software security alone is not adequate enough.  ...  Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere.  ...  B.J.M. was responsible for guiding the hardware security part, helped in the security analysis and writing the paper.  ... 
doi:10.3390/jsan8030042 fatcat:zuzw6sf2hzgdfiz65p2joz2g6a

Hardware Security in Advanced Manufacturing

Mohammad Monjur, Joshua Calzadillas, Mashrafi Kajol, Qiaoyan Yu
2022 Proceedings of the Great Lakes Symposium on VLSI 2022  
Unique attack examples such as hardware Trojan, interface sniffing, and fraudulent data injection attacks are provided in this work to highlight the unique challenges of attack detection and mitigation  ...  For instance, the option of remote access makes advanced manufacturing infrastructures vulnerable to various security attacks from physical devices to cyberspace.  ...  Such as noise could lead the monitoring system to experience some natural faults.  ... 
doi:10.1145/3526241.3530829 fatcat:5w6mbanhbjdabnk7cmklddfwri

Hardware Security in Emerging Technologies: Vulnerabilities, Attacks, and Solutions

Naghmeh Karimi, Kanad Basu, Chip-Hong Chang, Jason M. Fung
2021 IEEE Journal on Emerging and Selected Topics in Circuits and Systems  
She has been a Visiting Assistant Professor at New York University and Rutgers University from 2012 to 2016.  ...  Wen-Hsiao Peng, as well as the Senior Editorial Board for their continuous support and guidance throughout the process.  ...  In the article titled "A new lightweight in-situ adversarial sample detector for edge deep neural network," the authors propose a new hardware-oriented approach for in-situ detection of adversarial inputs  ... 
doi:10.1109/jetcas.2021.3084498 fatcat:asdqf3hf5rhtffa6gsmu7xu4yi

Cyber-Physical Systems Security: Limitations, Issues and Future Trends

Jean-Paul A. Yaacoub, Ola Salman, Hassan N. Noura, Nesrine Kaaniche, Ali Chehab, Mohamad Malli
2020 Microprocessors and microsystems  
Their integration with IoT led to a new CPS aspect, the Internet of Cyber-Physical Things (IoCPT).  ...  The fast and significant evolution of CPS affects various aspects in people's way of life and enables a wider range of services and applications including e-Health, smart homes, e-Commerce, etc.  ...  Their combined approach can also be used for forensic purposes including the identification of the areas where the code injection took place, along with which part of the code caused its execution.  ... 
doi:10.1016/j.micpro.2020.103201 pmid:32834204 pmcid:PMC7340599 fatcat:omeihta4vbe55cohyhbhi56mzm

Table of Contents – Technical

2021 2021 IEEE International Joint EMC/SI/PI and EMC Europe Symposium  
method to obtain multiple and reproducible fault models on a 32-bit Micro-controller (MCU) using Electromagnetic Fault Injection (EMFI).  ...  Radasky, Metatech Corporation, Goleta, CA, USA 11:00 Multiple and Reproducible Fault Models on Micro-Controller using Electromagnetic Fault Injection .......................................  ... 
doi:10.1109/emc/si/pi/emceurope52599.2021.9559379 fatcat:bqobkpurjje4vb5xpdk56r4lpi

Hardware Trojan Horses in Cryptographic IP Cores

Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Xuan Thuy Ngo, Laurent Sauvage
2013 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography  
The context is that of a fabless design house that sells IP blocks as GDSII hard macros, and wants to check that final products have not been infected by trojans during the foundry stage.  ...  a complete re-place and re-route, which is detected by mere optical imaging (and not complete chip reverse-engineering).  ...  David Naccache for the suggestion about a DFA-based hardware trojan that would trigger only on some plaintexts.  ... 
doi:10.1109/fdtc.2013.15 dblp:conf/fdtc/BhasinDGNS13 fatcat:rm3uny2l5vgmreyts6yjuaxhhy

Hardware-assisted Machine Learning in Resource-constrained IoT Environments for Security: Review and Future Prospective

Georgios Kornaros
2022 IEEE Access  
This review aims to illuminate the value of various approaches for addressing IoT security in a truly effective, flexible, and seamless manner, as well as to provide answers to questions about tradeoffs  ...  computing and user privacy, as well as protecting against attacks such as spoofing, denial of service (DoS), jamming, and eavesdropping.  ...  In addition to cyber-physical attacks, as it is not easy to distinguish the cause of such an abnormal situation in a given system, either a fault or an attack, detection and prevention techniques should  ... 
doi:10.1109/access.2022.3179047 fatcat:damwrncpzzbxzamtghwlmrg6v4

Physically Unclonable Functions and AI: Two Decades of Marriage [article]

Fatemeh Ganji, Shahin Tajik
2021 arXiv   pre-print
Metrics and procedures devised for this are further discussed. Moreover, By reviewing PUFs designed by applying AI techniques, we give insight into future research directions in this area.  ...  The current chapter aims at establishing a relationship between artificial intelligence (AI) and hardware security.  ...  Acknowledgements We are deeply grateful for the guidance and support of our Ph.D. advisor, Jean-Pierre Seifert.  ... 
arXiv:2008.11355v2 fatcat:jxt5iueznzhqlmbcsbbgu3kzua

Field Programmable Gate Array Applications—A Scientometric Review

Juan Ruiz-Rosero, Gustavo Ramirez-Gonzalez, Rahul Khanna
2019 Computation  
These publications show the vast range of applications based on FPGAs, from the new mechanism that enables the magnetic suspension system for the kilogram redefinition, to the Mars rovers' navigation systems  ...  Field Programmable Gate Array (FPGA) is a general purpose programmable logic device that can be configured by a customer after manufacturing to perform from a simple logic gate operations to complex systems  ...  Electromagnetic Transient Faults Injection on a hardware and a software implementations of AES.  ... 
doi:10.3390/computation7040063 fatcat:wxtatzsvvnfopghdfl25hcfc2a
« Previous Showing results 1 — 15 out of 66 results