A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

Robust and efficient three-factor authentication solution for WSN-based industrial IoT deployment

K Mahmood, MA Saleem, Z Ghaffar, S Shamshad… - Internet of Things, 2024 - Elsevier
The relentless advancements in Cyber-Physical Systems (CPS) and Wireless Sensor
Networks (WSN) have paved the way for various practical applications across networking …

Rewrite to reinforce: Rewriting the binary to apply countermeasures against fault injection

P Kiaei, CB Breunesse, M Ahmadi… - 2021 58th ACM/IEEE …, 2021 - ieeexplore.ieee.org
Fault injection attacks can cause errors in software for malicious purposes. Oftentimes,
vulnerable points of a program are detected after its development. It is therefore critical for …

Formally Verified Hardening of C Programs against Hardware Fault Injection

B Pesin, S Boulmé, D Monniaux, ML Potet - Proceedings of the 14th …, 2025 - dl.acm.org
A fault attack is a malicious manipulation of the hardware (eg, electromagnetic or laser
pulse) that modifies the behavior of the software. Fault attacks typically target sensitive …

A tool assisted methodology to harden programs against multi-faults injections

E Boespflug, A Bouguern, L Mounier… - arxiv preprint arxiv …, 2023 - arxiv.org
Fault attacks consist in changing the program behavior by injecting faults at run-time in order
to break some expected security properties. Applications are hardened against fault attack …

A compositional methodology to harden programs against multi-fault attacks

E Boespflug, L Mounier, ML Potet… - 2023 Workshop on …, 2023 - ieeexplore.ieee.org
Fault attacks consist in changing the program behavior by injecting faults at run-time in order
to break some expected security properties. Applications are hardened against fault attack …

Maskara: Compilation of a masking countermeasure with optimized polynomial interpolation

N Belleville, D Couroussé… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Side-channel attacks are amongst the major threats for embedded systems and IoT devices.
Masking is one of the most used countermeasure against such attacks, but its application …

Étude de vulnérabilité d'un programme au format binaire en présence de fautes précises et nombreuses

A Gicquel - 2024 - hal.science
Les attaques multi-fautes permettent de compromettre la sécurité d'applications prouvées
théoriquement robustes, et cela, malgré l'intégration de mécanismes de sécurité …

(On) The Impact of the Micro-architecture on Countermeasures against Side-Channel Attacks

L Casalino - 2024 - theses.hal.science
Side-channels attacks are recognized as a threat for the confidentiality of data, in particular
on embedded systems. The masking countermeasure constitutes a provably secure …

[PDF][PDF] Cross-Layer Vulnerability Analysis of System-on-Chip against Physical Hardware Attacks

P Kiaei - 2022 - digital.wpi.edu
Hardware attacks, such as power side-channel attacks, jeopardize the security of embedded
systems at a low cost. Protecting embedded systems against such attacks entails protecting …