A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

How practical are fault injection attacks, really?

J Breier, X Hou - IEEE Access, 2022 - ieeexplore.ieee.org
Fault injection attacks (FIA) are a class of active physical attacks, mostly used for malicious
purposes such as extraction of cryptographic keys, privilege escalation, attacks on neural …

SNIFF: reverse engineering of neural networks with fault attacks

J Breier, D Jap, X Hou, S Bhasin… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Neural networks have been shown to be vulnerable against fault injection attacks. These
attacks change the physical behavior of the device during the computation, resulting in a …

Friet: An Authenticated Encryption Scheme with Built-in Fault Detection

T Simon, L Batina, J Daemen, V Grosso… - … Conference on the …, 2020 - Springer
In this work we present a duplex-based authenticated encryption scheme Friet based on a
new permutation called Friet-P. We designed Friet-P with a novel approach for cryptographic …

Fault attacks in symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

Compiler-assisted loop hardening against fault attacks

J Proy, K Heydemann, A Berzati, A Cohen - ACM Transactions on …, 2017 - dl.acm.org
Secure elements widely used in smartphones, digital consumer electronics, and payment
systems are subject to fault attacks. To thwart such attacks, software protections are …

Classical and physical security of symmetric key cryptographic algorithms

A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …

Custom instruction support for modular defense against side-channel and fault attacks

P Kiaei, D Mercadier, PE Dagand… - … Side-Channel Analysis …, 2021 - Springer
The design of software countermeasures against active and passive adversaries is a
challenging problem that has been addressed by many authors in recent years. The …

Fault attacks made easy: Differential fault analysis automation on assembly code

J Breier, X Hou, Y Liu - IACR Transactions on Cryptographic …, 2018 - dr.ntu.edu.sg
Over the past decades, fault injection attacks have been extensively studied due to their
capability to efficiently break cryptographic implementations. Fault injection attack models …

Glitching demystified: analyzing control-flow-based glitching attacks and defenses

C Spensky, A Machiry, N Burow… - 2021 51st Annual …, 2021 - ieeexplore.ieee.org
Hardware fault injection, or glitching, attacks can compromise the security of devices even
when no software vulnerabilities exist. Attempts to analyze the hardware effects of glitching …