Results 251 to 260 of about 3,574 (299)
Some of the next articles are maybe not open access.

JTAG Fault Injection Attack

IEEE Embedded Systems Letters, 2018
Fault injection attacks are wide spread in the domain of smart cards and microcontrollers but have not been yet democratized on complex embedded microprocessors, such as system on chip that can be found in smart phones, tablets, and automotive systems.
F. Majeric, B. Gonzalvo, L. Bossuet
openaire   +2 more sources

Faults, Injection Methods, and Fault Attacks

IEEE Design & Test of Computers, 2007
An active attacker can induce errors during the computation of the cryptographic algorithm and exploit the faulty results to extract information about the secret key in embedded systems. We call this kind of attack a fault attack. Fault attacks can break an unprotected system more quickly than any other kind of side-channel attack such as simple power ...
Chong Hee Kim, Jean-Jacques Quisquater
openaire   +1 more source

LLFI: Lateral Laser Fault Injection Attack

2019 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2019
In this work, a novel technique of fault injection attack on secure integrated circuits (ICs) devices is presented: Lateral Laser Fault Injection (LLFI). Laser Fault Injection with backside illumination is typically the most efficient and widely used technique to perturb secure ICs.
Joaquin Rodriguez   +3 more
openaire   +1 more source

Fault Injection Attack on A5/3

2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications, 2011
In this paper, we propose a fault injection attack on A5/3 used in GSM. This attack is based on the fault assumption in [9]. That is, it is assumed that we can decrease the number of rounds in block cipher KASUMI of A5/3 by injecting some faults. With small number of fault injections, we can recover the session key of A5/3 supporting a 64-bit session ...
Kitae Jeong   +3 more
openaire   +1 more source

Attacking embedded systems through fault injection

2011 2nd National Conference on Emerging Trends and Applications in Computer Science, 2011
Embedded Systems are being used for the development and implementation of Safety and Mission Critical Systems. Malfunctions of such type of embedded systems will lead to disasters at times. The embedded systems must be fully secured from outside intervention in order to have effective functioning as well as to provide protective environment to these ...
J. K. R. Sastry   +2 more
openaire   +1 more source

Fault attacks, injection techniques and tools for simulation

2015 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS), 2015
Faults attacks are a serious threat to secure devices, because they are powerful and they can be performed with extremely cheap equipment. Resistance against fault attacks is often evaluated directly on the manufactured devices, as commercial tools supporting fault evaluation do not usually provide the level of details needed to assert the security of ...
Piscitelli, R.   +2 more
openaire   +2 more sources

Stratification of Hardware Attacks: Side Channel Attacks and Fault Injection Techniques

SN Computer Science, 2021
Cryptographic devices have many encrypted and secured solutions to protect them against hardware attacks. Hardware designers spent huge amount of time and effort in implementing cryptographic algorithms, keeping the analysis of design constraints into consideration.
Shaminder Kaur   +2 more
openaire   +1 more source

Bitstream Fault Injections (BiFI)–Automated Fault Attacks Against SRAM-Based FPGAs

IEEE Transactions on Computers, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Pawel Swierczynski   +3 more
openaire   +1 more source

Exploiting PUF Variation to Detect Fault Injection Attacks

2022 25th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), 2022
Green Open Access added to TU Delft Institutional Repository 'You share, we take care!' - Taverne project https://www.openaccess.nl/en/you-share-we-take-care Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.
Köylü, T.C. (author)   +5 more
openaire   +2 more sources

Electric probes for fault injection attack

2013 Asia-Pacific Symposium on Electromagnetic Compatibility (APEMC), 2013
Extracting secret information from an integrated circuit by disturbing it with an electromagnetic (EM) pulse has a growing interest. The success of such a process depends directly on the EM probes used. In this paper, we present the results of the experimental characterization of three electric probes, through their bandwidth and opening width ...
openaire   +1 more source

Home - About - Disclaimer - Privacy