Rascv2: Enabling remote access to side-channels for mission critical and iot systems

Y Bai, A Stern, J Park, M Tehranipoor… - ACM Transactions on …, 2022‏ - dl.acm.org
The Internet of Things (IoT) and smart devices are currently being deployed in systems such
as autonomous vehicles and medical monitoring devices. The introduction of IoT devices …

Design and analysis of hardware trojan threats in reconfigurable hardware

N Giri, NN Anandakumar - 2020 International Conference on …, 2020‏ - ieeexplore.ieee.org
Hardware Trojan (HT) is increasingly becoming a major threat that risks to the security of
modern Integrated Circuits (ICs) industry. An adversary intentionally makes some …

CryptoQNRG: A new framework for evaluation of cryptographic strength in quantum and pseudorandom number generation for key-scheduling algorithms

A Saini, A Tsokanos, R Kirner - The Journal of Supercomputing, 2023‏ - Springer
In a cryptosystem, a cipher's security is directly dependent on a key-schedule or key-
scheduling algorithm (KSA) or that is used for both encryption and decryption. The random …

Improved security approach based on AES algorithm for LST retrieval using satellite imagery in radiation-tolerant FPGAs

A El Makhloufi, N Chekroun, S El Adib… - International Journal of …, 2022‏ - igi-global.com
Remote sensing satellite missions consist of captured images using satellite sensor
technologies to detect and classify objects on earth(Fu et al., 2020; Semlali & Chaker, 2019). …

EM Side-Channel Attack on AES

M Tehranipoor, N Nalla Anandakumar… - … Security Training, Hands …, 2023‏ - Springer
In recent years, cryptographic circuits have become essential to the security of embedded
systems. However, side-channel attacks, which reveal a secret key on the cryptographic …

Power Analysis Attacks on AES

M Tehranipoor, N Nalla Anandakumar… - … Security Training, Hands …, 2023‏ - Springer
A side-channel attack does not exploit the mathematical properties of the cipher. Instead, it
targets the implementations, where processed data may be leaked, eg, through power …

Key retrieval from AES architecture through hardware Trojan horse

S Manivannan, N Nalla Anandakumar… - … Symposium on Security …, 2018‏ - Springer
Abstract The study of Hardware Trojan and its impact is a cutting edge research topic today.
Hardware Trojan Horses (HTH) are inserted by an adversary either during design or …

Voltage Glitch Attack on an FPGA AES Implementation

M Tehranipoor, N Nalla Anandakumar… - … Security Training, Hands …, 2023‏ - Springer
Fault injection attack (FIA) has proven to be a powerful technique for uncovering confidential
data with a limited number of experiments and minimal effort. A device's operation is …

Security Verification

M Tehranipoor, N Nalla Anandakumar… - … Security Training, Hands …, 2023‏ - Springer
Security of a system on chip (SoC) can be weakened by exploiting the inherent and potential
vulnerabilities of the intellectual property (IP) cores used to implement the design as well as …

Clock Glitch Fault Attack on FSM in AES Controller

M Tehranipoor, N Nalla Anandakumar… - … Security Training, Hands …, 2023‏ - Springer
Secure circuits are prone to a wide range of physical attacks. Among them, fault attacks are
based on modifying the circuit environment in order to change its behavior or to induce faults …