Results 251 to 260 of about 111,641 (296)
Some of the next articles are maybe not open access.
Faults, Injection Methods, and Fault Attacks
IEEE Design & Test of Computers, 2007An active attacker can induce errors during the computation of the cryptographic algorithm and exploit the faulty results to extract information about the secret key in embedded systems. We call this kind of attack a fault attack. Fault attacks can break an unprotected system more quickly than any other kind of side-channel attack such as simple power ...
Chong Hee Kim, Jean-Jacques Quisquater
openaire +1 more source
Fault injection acceleration by simultaneous injection of non-interacting faults
Proceedings of the 53rd Annual Design Automation Conference, 2016Fault injection is the de facto standard for evaluating the sensitivity of digital systems to transient errors. Due to various masking effects only a very small portion of the injected faults lead to system-level failures, and hence, too many faults have to be injected for achieving statistically meaningful results. At the same time, since the majority
Ebrahimi, Mojtaba +3 more
openaire +2 more sources
Fault injection for formal testing of fault tolerance
IEEE Transactions on Reliability, 1996This study addresses the use of fault injection for explicitly removing design/implementation faults in complex fault-tolerance algorithms and mechanisms (FTAM), viz, fault-tolerance deficiency faults. A formalism is introduced to represent the FTAM by a set of assertions.
Dimiter R. Avresky +3 more
openaire +1 more source
Fault injection for the formal testing of fault tolerance
[1992] Digest of Papers. FTCS-22: The Twenty-Second International Symposium on Fault-Tolerant Computing, 2003The authors address the issue of the use of fault injection for explicitly removing design/implementation faults in fault tolerance algorithms and mechanisms. A formalism is introduced that represents the fault tolerance algorithms and mechanisms by means of a set of assertions. This formalism enables the execution tree to be presented, where each path
Dimiter R. Avresky +3 more
openaire +1 more source
On the emulation of software faults by software fault injection
Proceeding International Conference on Dependable Systems and Networks. DSN 2000, 2002This paper presents an experimental study on the emulation of software faults by fault injection. In a first experiment, a set of real software faults has been compared with faults injected by a SWIFI tool (Xception) to evaluate the accuracy of the injected faults. Results revealed the limitations of Xception (and other SWIFI tools) in the emulation of
Henrique Madeira +2 more
openaire +1 more source
Fault injection for the masses
Computer, 1997The key technology that the author would like to see adopted by the masses is a family of software fault injection algorithms that can predict where to concentrate testing. From a novelty standpoint, these algorithms were (and still are) unique among other methods of performing fault injection. The author concedes that the algorithms are computational,
openaire +1 more source
Generic Fault Modelling for Fault Injection
2011Fault injection is a widely used experimental dependability validation method, with a vast amount of techniques and tools. Within the scope of MOGENTES, an EU 7th framework programme project, tools have been developed which implements three different fault injection techniques; hardware-implemented fault injection, software-implemented fault injection ...
Rickard Svenningsson +3 more
openaire +1 more source
Hardware fault injection with UMLinux
2003 International Conference on Dependable Systems and Networks, 2003. Proceedings., 2004The UMLinux [3] environment provides virtualmachines on top of which the Linux operating sys-temandoff-the-shelfsoftwareisinstalled. UsingUM-Linux, you can set up systems consisting of severalnetworked virtual machines.A userfriendly GUI guides you through the processof configuring the virtual hardware.
Kerstin Buchacker +5 more
openaire +1 more source
To Exploit Fault Injection on Non-injective Sboxes
2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2015Differential Fault Analysis (DFA) attacks are well known to cryptanalyse embedded cryptographic algorithms. However, efficient countermeasures exist and most devices are now secured against this kind of attacks. In the same way, Safe Error attacks avoid most of DFA countermeasures but they can not break a masked implementation.
Guillaume Bethouart, Nicolas Debande
openaire +1 more source
IEEE Embedded Systems Letters, 2018
Fault injection attacks are wide spread in the domain of smart cards and microcontrollers but have not been yet democratized on complex embedded microprocessors, such as system on chip that can be found in smart phones, tablets, and automotive systems.
F. Majeric, B. Gonzalvo, L. Bossuet
openaire +2 more sources
Fault injection attacks are wide spread in the domain of smart cards and microcontrollers but have not been yet democratized on complex embedded microprocessors, such as system on chip that can be found in smart phones, tablets, and automotive systems.
F. Majeric, B. Gonzalvo, L. Bossuet
openaire +2 more sources

