[HTML][HTML] A systematic review of fault injection attacks on iot systems

A Gangolli, QH Mahmoud, A Azim - Electronics, 2022 - mdpi.com
The field of the Internet of Things (IoT) is growing at a breakneck pace and its applications
are becoming increasingly sophisticated with time. Fault injection attacks on IoT systems are …

Challenges and opportunities of security-aware EDA

J Feldtkeller, P Sasdrich, T Güneysu - ACM Transactions on Embedded …, 2023 - dl.acm.org
The foundation of every digital system is based on hardware in which security, as a core
service of many applications, should be deeply embedded. Unfortunately, the knowledge of …

Fault-resistant partitioning of secure cpus for system co-verification against faults

S Tollec, V Hadži, P Nasahl, M Asavoae… - IACR Transactions on …, 2024 - incs.ub.rub.de
Fault injection attacks are a serious threat to system security, enabling attackers to bypass
protection mechanisms or access sensitive information. To evaluate the robustness of CPU …

Revisiting fault adversary models–hardware faults in theory and practice

J Richter-Brockmann, P Sasdrich… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Fault injection attacks are considered as powerful techniques to successfully attack
embedded cryptographic implementations since various fault injection mechanisms from …

VERICA-Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering

J Richter-Brockmann, J Feldtkeller… - IACR Transactions on …, 2022 - incs.ub.rub.de
Physical attacks, including passive Side-Channel Analysis and active Fault Injection
Analysis, are considered among the most powerful threats against physical cryptographic …

Fault attacks on access control in processors: Threat, formal analysis and microarchitectural mitigation

ALD Antón, J Müller, MR Fadiheh, D Stoffel… - IEEE Access, 2023 - ieeexplore.ieee.org
Process isolation is a key component of the security architecture in any hardware/software
system. However, even when implemented correctly and comprehensively at the software …

Learn from your faults: leakage assessment in fault attacks using deep learning

S Saha, M Alam, A Bag, D Mukhopadhyay… - Journal of …, 2023 - Springer
Generic vulnerability assessment of cipher implementations against Fault Attacks (FA) is a
largely unexplored research area. Security assessment against FA is critical for FA …

CINI MINIS: domain isolation for fault and combined security

J Feldtkeller, J Richter-Brockmann, P Sasdrich… - Proceedings of the …, 2022 - dl.acm.org
Observation and manipulation of physical characteristics are well-known and powerful
threats to cryptographic devices. While countermeasures against passive side-channel and …

Impeccable Keccak: Towards Fault Resilient SPHINCS+ Implementations

I Gavrilan, F Oberhansl, A Wagner… - IACR Transactions …, 2024 - ojs.ub.ruhr-uni-bochum.de
The standardization of the hash-based digital signature scheme SPHINCS+ proceeds faster
than initially expected. This development seems to be welcomed by practitioners who …

EC-CFI: Control-flow Integrity via code encryption counteracting fault attacks

P Nasahl, S Sultana, H Liljestrand… - … Security and Trust …, 2023 - ieeexplore.ieee.org
Fault attacks enable adversaries to manipulate the controlflow of security-critical
applications. By inducing targeted faults into the CPU, the software's call graph can be …