An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

Sofi: Security property-driven vulnerability assessments of ics against fault-injection attacks

H Wang, H Li, F Rahman… - … on Computer-Aided …, 2021 - ieeexplore.ieee.org
Fault-injection attacks have become a major concern for hardware designs, primarily due to
their powerful capability in tampering with critical locations in a device to cause violation of …

Cryptographic fault diagnosis using VerFI

V Arribas, F Wegener, A Moradi… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Historically, fault diagnosis for integrated circuits has singularly dealt with reliability
concerns. In contrast, a cryptographic circuit needs to be primarily evaluated concerning …

Fault attacks in symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

Learn from your faults: leakage assessment in fault attacks using deep learning

S Saha, M Alam, A Bag, D Mukhopadhyay… - Journal of …, 2023 - Springer
Generic vulnerability assessment of cipher implementations against Fault Attacks (FA) is a
largely unexplored research area. Security assessment against FA is critical for FA …

Classical and physical security of symmetric key cryptographic algorithms

A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …

ARMORY: Fully Automated and Exhaustive Fault Simulation on ARM-M Binaries

M Hoffmann, F Schellenberg… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Embedded systems are ubiquitous. However, physical access of users and likewise
attackers makes them often threatened by fault attacks: a single fault during the computation …

Quantitative Fault Injection Analysis

J Feldtkeller, T Güneysu, P Schaumont - … on the Theory and Application of …, 2023 - Springer
Active fault injection is a credible threat to real-world digital systems computing on sensitive
data. Arguing about security in the presence of faults is non-trivial, and state-of-the-art …

SAFARI: Automatic synthesis of fault-attack resistant block cipher implementations

I Roy, C Rebeiro, A Hazra… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Most cipher implementations are vulnerable to a class of cryptanalytic attacks known as fault
injection attacks. To reveal the secret key, these attacks make use of faults induced at …