Fault attacks on secure embedded software: Threats, design, and evaluation

B Yuce, P Schaumont, M Witteman - Journal of Hardware and Systems …, 2018 - Springer
Embedded software is developed under the assumption that hardware execution is always
correct. Fault attacks break and exploit that assumption. Through the careful introduction of …

On code execution tracking via power side-channel

Y Liu, L Wei, Z Zhou, K Zhang, W Xu, Q Xu - Proceedings of the 2016 …, 2016 - dl.acm.org
With the proliferation of Internet of Things, there is a growing interest in embedded system
attacks, eg, key extraction attacks and firmware modification attacks. Code execution …

Introduction to side-channel attacks and fault attacks

Y Li, M Chen, J Wang - 2016 Asia-Pacific International …, 2016 - ieeexplore.ieee.org
Side-channel attacks and fault attacks use the physical interactions with cryptographic
devices to achieve the shortcuts of recovering the secret key. For side-channel attacks …

New methods of template attack based on fault sensitivity analysis

Q Wang, A Wang, G Qu, G Zhang - IEEE transactions on multi …, 2017 - ieeexplore.ieee.org
Fault Sensitivity Analysis (FSA) is a side-channel attack that utilizes the sensitive delay of
circuits to retrieve the key in cryptographic systems. In this paper, we propose the concept of …

Incremental fault analysis: Relaxing the fault model of differential fault attacks

TE Pogue, N Nicolici - IEEE Transactions on Very Large Scale …, 2019 - ieeexplore.ieee.org
This article presents a new fault analysis technique against cryptographic devices called the
incremental fault analysis (IFA), which can be adapted into fault attacks using more …

A new zero value attack combined fault sensitivity analysis on masked AES

Q Wang, A Wang, L Wu, J Zhang - Microprocessors and Microsystems, 2016 - Elsevier
Recently, a new kind of fault-based attacks called fault sensitivity analysis (FSA) has been
proposed, which has significant advantage over the traditional Differential Fault Attacks …

Fault attacks on embedded software: New directions in modeling, design, and mitigation

B Yuce - 2018 - vtechworks.lib.vt.edu
This research investigates an important class of hardware attacks against embedded
software, which uses fault injection as a hacking tool. Fault attacks use well-chosen, targeted …

Reduction in the number of fault injections for blind fault attack on SPN block ciphers

Y Li, M Chen, Z Liu, J Wang - ACM Transactions on Embedded …, 2016 - dl.acm.org
In 2014, a new fault analysis called blind fault attack (BFA) was proposed, in which attackers
can only obtain the number of different faulty outputs without knowing the public data. The …

Mixed-grain parity-code-based fault detection method against fault injection

P WANG, Q LIU - 北京航空航天大学学报, 2019 - bhxb.buaa.edu.cn
For efficient countermeasure against fault injection attacks, a mixed-grain parity-code-based
fault detection approach was proposed. Traditional parity-code-based fault detection …

Homological Fault Attack on AES Block Cipher and Its Countermeasures

N Shang, J Zhang, Y Ding, C Chen, A Wang - Proceedings of the 9th …, 2021 - Springer
As the physical security of hardware systems becomes more and more serious, a large
number of physical attacks and countermeasures against on-chip cryptographic algorithms …