Results 21 to 30 of about 3,574 (299)
Redshift: Manipulating Signal Propagation Delay via Continuous-Wave Lasers
We propose a new laser injection attack Redshift that manipulates signal propagation delay, allowing for precise control of oscillator frequencies and other behaviors in delay-sensitive circuits.
Kohei Yamashita +4 more
doaj +3 more sources
Analysis of an Optimal Fault Attack on the LED-64 Lightweight Cryptosystem
This paper presents an optimal method for recovering the secret keys of the light encryption device (LED) by combining the impossible differential fault attack with the algebraic differential fault attack. The proposed optimal method effectively improves
Liang Dong +5 more
doaj +1 more source
In this study, a co-design method of dual security control and communication is investigated for a nonlinear cyber–physical system (CPS) with an actuator fault and false data injection (FDI) attacks.
Li Zhao, Wei Li, YaJie Li
doaj +1 more source
Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures [PDF]
Implementations of cryptographic algorithms continue to proliferate in consumer products due to the increasing demand for secure transmission of confidential information. Although the current standard cryptographic algorithms proved to withstand exhaustive attacks, their hardware and software implementations have exhibited vulnerabilities to side ...
BARENGHI, ALESSANDRO +3 more
openaire +3 more sources
Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP
At SAC 2016, Espitau et al. presented a loop-abort fault attack against lattice-based signature schemes following the Fiat–Shamir with aborts paradigm.
Vincent Quentin Ulitzsch +4 more
doaj +1 more source
Voltage Fault Injection Attack on Key Expansion of AES [PDF]
Aiming at the Advanced Encryption Standard(AES) algorithm,this paper proposes a simple and efficient method of fault injection attack.By instantaneously reducing the voltage of the cipher chip power supply,the low voltage burr is generated,which causes ...
DUAN Xiaoyi, TIAN Lina, ZHANG Lei, WANG Jianxin, LI Xiuying, ZHANG Kaijian
doaj +1 more source
Detecting Fault Injection Attacks with Runtime Verification [PDF]
Fault injections are increasingly used to attack/test secure applications. In this paper, we define formal models of runtime monitors that can detect fault injections that result in test inversion attacks and arbitrary jumps in the control flow. Runtime verification monitors offer several advantages. The code implementing a monitor is small compared to
Kassem, Ali, Falcone, Yliès
openaire +3 more sources
Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber
At Indocrypt 2021, Hermelink, Pessl, and Pöppelmann presented a fault attack against Kyber in which a system of linear inequalities over the private key is generated and solved.
Jeroen Delvaux
doaj +3 more sources
Evolving genetic algorithms for fault injection attacks
Genetic algorithms are used today to solve numerous difficult problems. However, it is often needed to specialize and adapt them further in order to successfully tackle some specific problem. One such example is the fault injection attack where the goal is to find a specific set of parameters that can lead to a successful cryptographic attack in a ...
Picek, Stjepan +3 more
openaire +4 more sources
A Fault Attack on the Family of Enocoro Stream Ciphers
A differential fault attack framework for the Enocoro family of stream ciphers is presented. We only require that the attacker can reset the internal state and inject a random byte-fault, in a random register, during a known time period.
Julian Danner, Martin Kreuzer
doaj +1 more source

