Learn from your faults: leakage assessment in fault attacks using deep learning

S Saha, M Alam, A Bag, D Mukhopadhyay… - Journal of …, 2023 - Springer
Generic vulnerability assessment of cipher implementations against Fault Attacks (FA) is a
largely unexplored research area. Security assessment against FA is critical for FA …

Quantitative Fault Injection Analysis

J Feldtkeller, T Güneysu, P Schaumont - … on the Theory and Application of …, 2023 - Springer
Active fault injection is a credible threat to real-world digital systems computing on sensitive
data. Arguing about security in the presence of faults is non-trivial, and state-of-the-art …

ExploreFault: Identifying exploitable fault models in block ciphers with reinforcement learning

H Guo, S Saha, V Gohil, S Patnaik… - 2023 60th ACM/IEEE …, 2023 - ieeexplore.ieee.org
Exploitable fault models for block ciphers are typically cipher-specific, and their identification
is essential for evaluating and certifying fault attack-protected implementations. However …

An Automated Fault Attack Framework for Block Ciphers Through Property Mining and Verification

X Wang, W Hu, S Tang, X Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Fault attacks are effective side-channel attack methods for cryptanalysis. However, existing
fault attack methods involve manual derivation of complex fault models or computation …

[PDF][PDF] SoK: Assisted Fault Simulation

A Adhikary, I Buhan - Applied Cryptography and Network Security …, 2023 - iacr.steepath.eu
Fault injection attacks have caused implementations to behave unexpectedly, resulting in a
spectacular bypass of security features and even the extraction of cryptographic keys …

SoK: The apprentice guide to automated fault injection simulation for security evaluation

A Adhikary, GT Petrucci, P Tanguy, V Lapôtre… - Cryptology ePrint …, 2024 - eprint.iacr.org
Identifying and mitigating vulnerable locations to fault injections requires significant
expertise and expensive equipment. Fault injections can damage hardware, cause software …

SoK: Assisted Fault Simulation: Existing Challenges and Opportunities Offered by AI

A Adhikary, I Buhan - … Conference on Applied Cryptography and Network …, 2023 - Springer
Fault injection attacks have caused implementations to behave unexpectedly, resulting in a
spectacular bypass of security features and even the extraction of cryptographic keys …

“Hello? Is There Anybody in There?” Leakage Assessment of Differential Privacy Mechanisms in Smart Metering Infrastructure

S Ghosh, M Alam, S Dey, D Mukhopadhyay - International Conference on …, 2024 - Springer
Smart meters provide fine-grained power usage profiles of consumers to utility providers to
facilitate various grid functionalities such as load monitoring, real-time pricing, etc. However …

Vulnerability Assessment of Ciphers To Fault Attacks Using Reinforcement Learning

H Guo, S Saha, S Patnaik, V Gohil… - Cryptology ePrint …, 2022 - eprint.iacr.org
A fault attack (FA) is one of the most potent threats to cryptographic applications.
Implementing a FA-protected block cipher requires knowledge of the exploitable fault space …

Leakage assessment in fault attacks: a deep learning perspective

S Saha, M Alam, A Bag, D Mukhopadhyay… - Cryptology ePrint …, 2020 - eprint.iacr.org
Generic vulnerability assessment of cipher implementations against fault attacks (FA) is a
largely unexplored research area to date. Security assessment against FA is particularly …