Results 31 to 40 of about 3,574 (299)

Classification of Quantum Computer Fault Injection Attacks

open access: yes, 2023
7 pages, 4 ...
Xu, Chuanqi   +2 more
openaire   +2 more sources

Experimental evaluation of differential fault attack on lightweight block cipher PIPO

open access: yesIET Information Security, 2023
The recent development of Internet of Things (IoT) devices has increased related security issues. Because of the rapid increase in the use of these devices, the possibility of accessing and hijacking cryptographic devices is increasing.
SeongHyuck Lim, Dong‐Guk Han
doaj   +1 more source

A fault attack on the Niederreiter cryptosystem using binary irreducible Goppa codes [PDF]

open access: yesGroups, Complexity, Cryptology, 2020
A fault injection framework for the decryption algorithm of the Niederreiter public-key cryptosystem using binary irreducible Goppa codes and classical decoding techniques is described. In particular, we obtain low-degree polynomial equations in parts of
Julian Danner, Martin Kreuzer
doaj   +1 more source

How Practical Are Fault Injection Attacks, Really?

open access: yesIEEE Access, 2022
Fault injection attacks (FIA) are a class of active physical attacks, mostly used for malicious purposes such as extraction of cryptographic keys, privilege escalation, attacks on neural network implementations. There are many techniques that can be used to cause the faults in integrated circuits, many of them coming from the area of failure analysis ...
Jakub Breier, Xiaolu Hou
openaire   +2 more sources

An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults

open access: yesSensors, 2020
Embedded encryption devices and smart sensors are vulnerable to physical attacks. Due to the continuous shrinking of chip size, laser injection, particle radiation and electromagnetic transient injection are possible methods that introduce transient ...
Liang Dong   +5 more
doaj   +1 more source

Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms

open access: yes, 2016
Fault Injection Attacks are a powerful form of active attack mechanism which can threaten even the strongest of cryptographic algorithms. This attack vector has become more pertinent with the growing popularity of the Internet of things (IoT), which is based on small omnipresent embedded systems interacting with sensitive data of personal or critical ...
Bhasin, Shivam, Mukhopadhyay, Debdeep
openaire   +2 more sources

Artificial Neural Networks and Fault Injection Attacks

open access: yes, 2022
This chapter is on the security assessment of artificial intelligence (AI) and neural network (NN) accelerators in the face of fault injection attacks. More specifically, it discusses the assets on these platforms and compares them with ones known and well-studied in the field of cryptographic systems. This is a crucial step that must be taken in order
Tajik, Shahin, Ganji, Fatemeh
openaire   +2 more sources

Persistent Fault Analysis on Block Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Persistence is an intrinsic nature for many errors yet has not been caught enough attractions for years. In this paper, the feature of persistence is applied to fault attacks, and the persistent fault attack is proposed.
Fan Zhang   +7 more
doaj   +1 more source

Private circuits II versus fault injection attacks [PDF]

open access: yes2015 International Conference on ReConFigurable Computing and FPGAs (ReConFig), 2015
Cryptographic implementations are subject to physical attacks. Private circuits II is a proven protection against a strong attacker, able to read and write on a finite number of chosen internal nodes. In practice, side-channel analyses and fault injections are less accurate: typically, classical injection techniques (clock and power glitches ...
Henitsoa Rakotomalala   +4 more
openaire   +1 more source

Fault data injection attack on car-following model and mitigation based on interval type-2 fuzzy logic controller

open access: yesIET Cyber-Physical Systems, 2019
Cyber defence mechanism is started with modelling the accurate car-following behaviour including cyber attack. The creation of finest models made the path of control action easier. The connection between the vehicles is mathematically formulated with the
Prabhakar Gunasekaran   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy