Learn from your faults: leakage assessment in fault attacks using deep learning
Generic vulnerability assessment of cipher implementations against Fault Attacks (FA) is a
largely unexplored research area. Security assessment against FA is critical for FA …
largely unexplored research area. Security assessment against FA is critical for FA …
Quantitative Fault Injection Analysis
Active fault injection is a credible threat to real-world digital systems computing on sensitive
data. Arguing about security in the presence of faults is non-trivial, and state-of-the-art …
data. Arguing about security in the presence of faults is non-trivial, and state-of-the-art …
ExploreFault: Identifying exploitable fault models in block ciphers with reinforcement learning
Exploitable fault models for block ciphers are typically cipher-specific, and their identification
is essential for evaluating and certifying fault attack-protected implementations. However …
is essential for evaluating and certifying fault attack-protected implementations. However …
An Automated Fault Attack Framework for Block Ciphers Through Property Mining and Verification
X Wang, W Hu, S Tang, X Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Fault attacks are effective side-channel attack methods for cryptanalysis. However, existing
fault attack methods involve manual derivation of complex fault models or computation …
fault attack methods involve manual derivation of complex fault models or computation …
[PDF][PDF] SoK: Assisted Fault Simulation
Fault injection attacks have caused implementations to behave unexpectedly, resulting in a
spectacular bypass of security features and even the extraction of cryptographic keys …
spectacular bypass of security features and even the extraction of cryptographic keys …
SoK: The apprentice guide to automated fault injection simulation for security evaluation
Identifying and mitigating vulnerable locations to fault injections requires significant
expertise and expensive equipment. Fault injections can damage hardware, cause software …
expertise and expensive equipment. Fault injections can damage hardware, cause software …
SoK: Assisted Fault Simulation: Existing Challenges and Opportunities Offered by AI
Fault injection attacks have caused implementations to behave unexpectedly, resulting in a
spectacular bypass of security features and even the extraction of cryptographic keys …
spectacular bypass of security features and even the extraction of cryptographic keys …
“Hello? Is There Anybody in There?” Leakage Assessment of Differential Privacy Mechanisms in Smart Metering Infrastructure
Smart meters provide fine-grained power usage profiles of consumers to utility providers to
facilitate various grid functionalities such as load monitoring, real-time pricing, etc. However …
facilitate various grid functionalities such as load monitoring, real-time pricing, etc. However …
Vulnerability Assessment of Ciphers To Fault Attacks Using Reinforcement Learning
A fault attack (FA) is one of the most potent threats to cryptographic applications.
Implementing a FA-protected block cipher requires knowledge of the exploitable fault space …
Implementing a FA-protected block cipher requires knowledge of the exploitable fault space …
Leakage assessment in fault attacks: a deep learning perspective
Generic vulnerability assessment of cipher implementations against fault attacks (FA) is a
largely unexplored research area to date. Security assessment against FA is particularly …
largely unexplored research area to date. Security assessment against FA is particularly …