Fault attacks on secure embedded software: Threats, design, and evaluation
Embedded software is developed under the assumption that hardware execution is always
correct. Fault attacks break and exploit that assumption. Through the careful introduction of …
correct. Fault attacks break and exploit that assumption. Through the careful introduction of …
On code execution tracking via power side-channel
With the proliferation of Internet of Things, there is a growing interest in embedded system
attacks, eg, key extraction attacks and firmware modification attacks. Code execution …
attacks, eg, key extraction attacks and firmware modification attacks. Code execution …
Introduction to side-channel attacks and fault attacks
Y Li, M Chen, J Wang - 2016 Asia-Pacific International …, 2016 - ieeexplore.ieee.org
Side-channel attacks and fault attacks use the physical interactions with cryptographic
devices to achieve the shortcuts of recovering the secret key. For side-channel attacks …
devices to achieve the shortcuts of recovering the secret key. For side-channel attacks …
New methods of template attack based on fault sensitivity analysis
Fault Sensitivity Analysis (FSA) is a side-channel attack that utilizes the sensitive delay of
circuits to retrieve the key in cryptographic systems. In this paper, we propose the concept of …
circuits to retrieve the key in cryptographic systems. In this paper, we propose the concept of …
Incremental fault analysis: Relaxing the fault model of differential fault attacks
This article presents a new fault analysis technique against cryptographic devices called the
incremental fault analysis (IFA), which can be adapted into fault attacks using more …
incremental fault analysis (IFA), which can be adapted into fault attacks using more …
A new zero value attack combined fault sensitivity analysis on masked AES
Recently, a new kind of fault-based attacks called fault sensitivity analysis (FSA) has been
proposed, which has significant advantage over the traditional Differential Fault Attacks …
proposed, which has significant advantage over the traditional Differential Fault Attacks …
Fault attacks on embedded software: New directions in modeling, design, and mitigation
B Yuce - 2018 - vtechworks.lib.vt.edu
This research investigates an important class of hardware attacks against embedded
software, which uses fault injection as a hacking tool. Fault attacks use well-chosen, targeted …
software, which uses fault injection as a hacking tool. Fault attacks use well-chosen, targeted …
Reduction in the number of fault injections for blind fault attack on SPN block ciphers
Y Li, M Chen, Z Liu, J Wang - ACM Transactions on Embedded …, 2016 - dl.acm.org
In 2014, a new fault analysis called blind fault attack (BFA) was proposed, in which attackers
can only obtain the number of different faulty outputs without knowing the public data. The …
can only obtain the number of different faulty outputs without knowing the public data. The …
Mixed-grain parity-code-based fault detection method against fault injection
P WANG, Q LIU - 北京航空航天大学学报, 2019 - bhxb.buaa.edu.cn
For efficient countermeasure against fault injection attacks, a mixed-grain parity-code-based
fault detection approach was proposed. Traditional parity-code-based fault detection …
fault detection approach was proposed. Traditional parity-code-based fault detection …
Homological Fault Attack on AES Block Cipher and Its Countermeasures
N Shang, J Zhang, Y Ding, C Chen, A Wang - Proceedings of the 9th …, 2021 - Springer
As the physical security of hardware systems becomes more and more serious, a large
number of physical attacks and countermeasures against on-chip cryptographic algorithms …
number of physical attacks and countermeasures against on-chip cryptographic algorithms …