Results 1 to 10 of about 38,778 (116)

Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Over the past decades, fault injection attacks have been extensively studied due to their capability to efficiently break cryptographic implementations.
Jakub Breier, Xiaolu Hou, Yang Liu
doaj   +4 more sources

Algebraic Fault Attack Against SIMECK Cipher Based on Optimized Fault Location [PDF]

open access: yesJisuanji gongcheng, 2019
This paper proposes a algebraic fault attack method based on optimized fault location against SIMECK cipher.By analyzing encryption diffusion defect of the SIMECK round function and the failure cause,the deterministic propagation characteristics of ...
HUANG Changyang, WANG Tao, WANG Xiaohan, CHEN Qingchao, YIN Shizhuang
doaj   +1 more source

DFARPA: Differential fault attack resistant physical design automation [PDF]

open access: yes2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2018
Differential Fault Analysis (DFA), aided by sophisticated mathematical analysis techniques for ciphers and precise fault injection methodologies, has become a potent threat to cryptographic implementations. In this paper, we propose, to the best of the our knowledge, the first “DFA-aware” physical design automation methodology, that effectively ...
Khairallah, Mustafa   +7 more
openaire   +2 more sources

FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Fault injection attacks are one of the most powerful forms of cryptanalytic attacks on ciphers. A single, precisely injected fault during the execution of a cipher like the AES, can completely reveal the key within a few milliseconds.
Keerthi K   +4 more
doaj   +1 more source

Multifault diagnosis in WSN using a hybrid metaheuristic trained neural network

open access: yesDigital Communications and Networks, 2020
Wireless sensor networks are susceptible to failures of nodes and links due to various physical or computational reasons. Some physical reasons include a very high temperature, a heavy load over a node, and heavy rain.
Pabitra Mohan Khilar, Tirtharaj Dash
doaj   +1 more source

Link-time smart card code hardening [PDF]

open access: yes, 2015
This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of source code hardening, avoids the need for manual assembly writing, and is ...
De Bosschere, Koen   +3 more
core   +1 more source

Estimating Impact and Frequency of Risks to Safety and Mission Critical Systems Using CVSS [PDF]

open access: yes, 2008
Many safety and mission critical systems depend on the correct and secure operation of both supportive and core software systems. E.g., both the safety of personnel and the effective execution of core missions on an oil platform depend on the correct ...
Engum, Erlend A.   +2 more
core   +5 more sources

Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Differential Fault Analysis (DFA) is considered as the most popular fault analysis method. While there are techniques that provide a fault analysis automation on the cipher level to some degree, it can be shown that when it comes to software ...
Xiaolu Hou   +3 more
doaj   +1 more source

FAULT DIAGNOSIS OF AN AIRCRAFT CONTROL SURFACES WITH AN AUTOMATED CONTROL SYSTEM

open access: yesНаучный вестник МГТУ ГА, 2017
This article is devoted to studying of fault diagnosis of an aircraft control surfaces using fault models to identify specific causes. Such failures as jamming, vibration, extreme run out and performance decrease are covered.It is proved that in case of ...
B. D. Ogunvoul   +2 more
doaj   +1 more source

A Blockchain-Enabled Neutrosophic Framework for Secure, Verifiable, and Adaptive Configuration Management Effectiveness and Computer Network Telemetry [PDF]

open access: yesNeutrosophic Sets and Systems
This paper presents a novel decision-making framework for secure and uncertainty-aware management of computer networks by applying Double Bounded Rough Neutrosophic Sets (DBRNS).
Xiaojian Hong
doaj   +1 more source

Home - About - Disclaimer - Privacy