Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on fault attacks on symmetric key cryptosystems
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
constitute a powerful tool to recover the secret key used in the encryption process. Fault …
EC-CFI: Control-flow Integrity via code encryption counteracting fault attacks
Fault attacks enable adversaries to manipulate the controlflow of security-critical
applications. By inducing targeted faults into the CPU, the software's call graph can be …
applications. By inducing targeted faults into the CPU, the software's call graph can be …
Chaotic clock driven cryptographic chip: Towards a DPA resistant AES processor
Designing a tamper-resistant microchip for small embedded systems is one of the urgent
demands of the computing community nowadays due to the immense security challenges …
demands of the computing community nowadays due to the immense security challenges …
Protecting indirect branches against fault attacks using ARM pointer authentication
Physically exposed embedded devices used in the IoT or automotive area are frequently
targeted by fault attacks. Mitigating this threat is crucial as such attacks can be used to hijack …
targeted by fault attacks. Mitigating this threat is crucial as such attacks can be used to hijack …
FIPAC: Thwarting fault-and software-induced control-flow attacks with ARM pointer authentication
With improvements in computing technology, more and more applications in the Internet-of-
Things, mobile devices, or automotive area embed powerful ARM processors. These …
Things, mobile devices, or automotive area embed powerful ARM processors. These …
μCFI: Formal Verification of Microarchitectural Control-flow Integrity
Formal verification of hardware often requires the creation of clock-cycle accurate properties
that need tedious and error-prone adaptations for each design. Property violations further …
that need tedious and error-prone adaptations for each design. Property violations further …
SAMVA: static analysis for multi-fault attack paths determination
Multi-fault injection attacks are powerful since they allow to bypass software security
mechanisms of embedded devices. Assessing the vulnerability of an application while …
mechanisms of embedded devices. Assessing the vulnerability of an application while …
Countermeasures optimization in multiple fault-injection context
Fault attacks consist in changing the program behavior by injecting faults at run-time, either
at hardware or at software level. Their goal is to change the correct progress of the algorithm …
at hardware or at software level. Their goal is to change the correct progress of the algorithm …
Verifying redundant-check based countermeasures: a case study
T Martin, N Kosmatov, V Prevosto - … of the 37th ACM/SIGAPP Symposium …, 2022 - dl.acm.org
To thwart fault injection based attacks on critical embedded systems, designers of sensitive
software use redundancy based countermeasure schemes. In some of these schemes …
software use redundancy based countermeasure schemes. In some of these schemes …
Using non-autonomous chaotic clocks to drive CPA-resistant AES cryptographic chips
In this brief, we provide further evidence on the robustness of the chaotic clocking technique
for driving a Correlation Power Analysis (CPA) resistant cryptographic chip running the …
for driving a Correlation Power Analysis (CPA) resistant cryptographic chip running the …