Results 1 to 10 of about 3,574 (299)

Novel Fault Injection Attack without Artificial Trigger [PDF]

open access: goldApplied Sciences, 2020
Theoretical process of fault injection attacks is defined as a process of recovering a secret key assuming that an attacker can inject faults into a specific targeted operation.
HanSeop Lim, JongHyeok Lee, Dong-Guk Han
doaj   +4 more sources

Backdoor Attack on Deep Neural Networks Triggered by Fault Injection Attack on Image Sensor Interface [PDF]

open access: yesSensors, 2023
A backdoor attack is a type of attack method that induces deep neural network (DNN) misclassification. The adversary who aims to trigger the backdoor attack inputs the image with a specific pattern (the adversarial mark) into the DNN model (backdoor ...
Tatsuya Oyama   +3 more
doaj   +2 more sources

Shaping the Glitch: Optimizing Voltage Fault Injection Attacks

open access: greenTransactions on Cryptographic Hardware and Embedded Systems, 2019
Voltage fault injection is a powerful active side channel attack that modifies the execution-flow of a device by creating disturbances on the power supply line.
Claudio Bozzato   +2 more
doaj   +3 more sources

Instruction flow-based detectors against fault injection attacks

open access: hybridMicroprocessors and Microsystems, 2022
Fault injection attacks are a threat to all digital systems, especially to the ones conducting security sensitive operations. Recently, the strategy of observing the instruction flow to detect attacks has gained popularity. In this paper, we provide a comparative study between three hardware-based techniques (i.e., recurrent neural network (RNN ...
Troya Çağıl Köylü   +4 more
openalex   +4 more sources

ATPG-Guided Fault Injection Attacks on Logic Locking [PDF]

open access: green2020 IEEE Physical Assurance and Inspection of Electronics (PAINE), 2020
Logic Locking is a well-accepted protection technique to enable trust in the outsourced design and fabrication processes of integrated circuits (ICs) where the original design is modified by incorporating additional key gates in the netlist, resulting in a key-dependent functional circuit.
Ayush Jain, Tanjidur Rahman, Ujjwal Guin
openalex   +4 more sources

Findings Annihilator(s) via Fault Injection Attack (FIA) on Boolean Function of Grain v0 [PDF]

open access: diamondITM Web of Conferences, 2019
In developing stream cipher algorithms, Boolean function is one of vital elements. Attacks on LFSR-based stream cipher is the challenge for the cryptanalyst to get low-degree annihilator(s).
Ariffin Muhammad Rezal Kamel   +4 more
doaj   +2 more sources

Parity Check Based Fault Detection against Timing Fault Injection Attacks [PDF]

open access: goldElectronics, 2022
Fault injection technologies can be utilized to steal secret information inside integrated circuits (ICs), and thus cause serious information security threats. Parity check has been adopted as an efficient method against fault injection attacks. However, the contradiction between security and overhead restricts the further development and applications ...
Maoshen Zhang   +3 more
openalex   +2 more sources

Laser Fault Injection Attacks against IHP Chips

open access: green, 2021
Dmytro Petryk   +2 more
openalex   +2 more sources

Differential Fault Attack Method on SM4 Based on Random Fault Injection [PDF]

open access: yesJisuanji gongcheng, 2016
In the existing researches,a fault is often required to be injected into a byte of a fixed position,and then special wrong ciphertext is obtained to carry out attacks.This assumption is difficult to achieve in the actual attack,so a differential fault ...
RONG Xuefang,WU Zhen,WANG Min,DU Zhibo,RAO Jintao
doaj   +1 more source

Design of fault injection platform for integrated shipboard network system [PDF]

open access: yesJisuanji gongcheng, 2019
In order to solve the test adequacy problem of the integrated shipboard network system,a network fault injection platform is designed.Based on network fault injection and network attack,the fault impact factor is constructed to form a fault model library.
ZHANG Ya
doaj   +1 more source

Home - About - Disclaimer - Privacy