Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code
Over the past decades, fault injection attacks have been extensively studied due to their capability to efficiently break cryptographic implementations.
Jakub Breier, Xiaolu Hou, Yang Liu
doaj +4 more sources
Algebraic Fault Attack Against SIMECK Cipher Based on Optimized Fault Location [PDF]
This paper proposes a algebraic fault attack method based on optimized fault location against SIMECK cipher.By analyzing encryption diffusion defect of the SIMECK round function and the failure cause,the deterministic propagation characteristics of ...
HUANG Changyang, WANG Tao, WANG Xiaohan, CHEN Qingchao, YIN Shizhuang
doaj +1 more source
DFARPA: Differential fault attack resistant physical design automation [PDF]
Differential Fault Analysis (DFA), aided by sophisticated mathematical analysis techniques for ciphers and precise fault injection methodologies, has become a potent threat to cryptographic implementations. In this paper, we propose, to the best of the our knowledge, the first “DFA-aware” physical design automation methodology, that effectively ...
Khairallah, Mustafa +7 more
openaire +2 more sources
Fault injection attacks are one of the most powerful forms of cryptanalytic attacks on ciphers. A single, precisely injected fault during the execution of a cipher like the AES, can completely reveal the key within a few milliseconds.
Keerthi K +4 more
doaj +1 more source
Multifault diagnosis in WSN using a hybrid metaheuristic trained neural network
Wireless sensor networks are susceptible to failures of nodes and links due to various physical or computational reasons. Some physical reasons include a very high temperature, a heavy load over a node, and heavy rain.
Pabitra Mohan Khilar, Tirtharaj Dash
doaj +1 more source
Link-time smart card code hardening [PDF]
This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of source code hardening, avoids the need for manual assembly writing, and is ...
De Bosschere, Koen +3 more
core +1 more source
Estimating Impact and Frequency of Risks to Safety and Mission Critical Systems Using CVSS [PDF]
Many safety and mission critical systems depend on the correct and secure operation of both supportive and core software systems. E.g., both the safety of personnel and the effective execution of core missions on an oil platform depend on the correct ...
Engum, Erlend A. +2 more
core +5 more sources
Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers
Differential Fault Analysis (DFA) is considered as the most popular fault analysis method. While there are techniques that provide a fault analysis automation on the cipher level to some degree, it can be shown that when it comes to software ...
Xiaolu Hou +3 more
doaj +1 more source
FAULT DIAGNOSIS OF AN AIRCRAFT CONTROL SURFACES WITH AN AUTOMATED CONTROL SYSTEM
This article is devoted to studying of fault diagnosis of an aircraft control surfaces using fault models to identify specific causes. Such failures as jamming, vibration, extreme run out and performance decrease are covered.It is proved that in case of ...
B. D. Ogunvoul +2 more
doaj +1 more source
A Blockchain-Enabled Neutrosophic Framework for Secure, Verifiable, and Adaptive Configuration Management Effectiveness and Computer Network Telemetry [PDF]
This paper presents a novel decision-making framework for secure and uncertainty-aware management of computer networks by applying Double Bounded Rough Neutrosophic Sets (DBRNS).
Xiaojian Hong
doaj +1 more source

