Voltage drop-based fault attacks on FPGAs using valid bitstreams

DRE Gnad, F Oboril, MB Tahoori - 2017 27th International …, 2017 - ieeexplore.ieee.org
Due to the widespread use of FPGAs in many critical application domains, their security is of
high concern. In recent systems, such as FPGAs in the Cloud or in Systems-on-Chip (SoCs) …

Side-channel analysis of PUFs and fuzzy extractors

D Merli, D Schuster, F Stumpf, G Sigl - … 2011, Pittsburgh, PA, USA, June 22 …, 2011 - Springer
Embedded security systems based on Physical Unclonable Functions (PUFs) offer
interesting protection properties, such as tamper resistance and unclonability. However, to …

Magnetic field fingerprinting of integrated-circuit activity with a quantum diamond microscope

MJ Turner, N Langellier, R Bainbridge, D Walters… - Physical Review …, 2020 - APS
Current density distributions in active integrated circuits result in patterns of magnetic fields
that contain structural and functional information about the integrated circuit. Magnetic fields …

Semi-invasive EM attack on FPGA RO PUFs and countermeasures

D Merli, D Schuster, F Stumpf, G Sigl - Proceedings of the Workshop on …, 2011 - dl.acm.org
It is often argued that Physical Unclonable Functions (PUFs) are resistant against invasive
and semi-invasive attacks since these attacks would damage the underlying PUF structure …

Localized electromagnetic analysis of cryptographic implementations

J Heyszl, S Mangard, B Heinz, F Stumpf… - Topics in Cryptology–CT …, 2012 - Springer
High resolution inductive probes enable precise measurements of the electromagnetic field
of small regions on integrated circuits. These precise measurements allow to distinguish the …

Efficient simulation of EM side-channel attack resilience

A Kumar, C Scarborough, A Yilmaz… - 2017 IEEE/ACM …, 2017 - ieeexplore.ieee.org
Electromagnetic (EM) fields emanated during crypto-operations are an effective non-
invasive channel for extracting secret keys. To predict vulnerabilities and improve resilience …

SCNIFFER: Low-cost, automated, efficient electromagnetic side-channel sniffing

J Danial, D Das, S Ghosh, A Raychowdhury… - IEEE Access, 2020 - ieeexplore.ieee.org
Electromagnetic (EM) side-channel analysis (SCA) is a prominent tool to break
mathematically-secure cryptographic engines, especially on resource-constrained devices …

Strengths and limitations of high-resolution electromagnetic field measurements for side-channel analysis

J Heyszl, D Merli, B Heinz, F De Santis… - Smart Card Research and …, 2013 - Springer
The electromagnetic field as a side-channel of cryptographic devices has been linked to
several advantages in past contributions. We provide a comprehensive study using high …

Side-channel analysis of the TERO PUF

L Tebelmann, M Pehl, V Immler - … 2019, Darmstadt, Germany, April 3–5 …, 2019 - Springer
Abstract Physical Unclonable Functions (PUFs) have the potential to provide a higher level
of security for key storage than traditional Non-Volatile Memory (NVM). However, the …

Improving non-profiled attacks on exponentiations based on clustering and extracting leakage from multi-channel high-resolution EM measurements

R Specht, J Heyszl, M Kleinsteuber, G Sigl - International Workshop on …, 2015 - Springer
The success probability of side-channel attacks depends on the used measurement
techniques as well as the algorithmic processing to exploit available leakage. This is …