A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

EC-CFI: Control-flow Integrity via code encryption counteracting fault attacks

P Nasahl, S Sultana, H Liljestrand… - … Security and Trust …, 2023 - ieeexplore.ieee.org
Fault attacks enable adversaries to manipulate the controlflow of security-critical
applications. By inducing targeted faults into the CPU, the software's call graph can be …

Chaotic clock driven cryptographic chip: Towards a DPA resistant AES processor

AA El-Moursy, AM Darya, AS Elwakil… - … on Emerging Topics …, 2020 - ieeexplore.ieee.org
Designing a tamper-resistant microchip for small embedded systems is one of the urgent
demands of the computing community nowadays due to the immense security challenges …

Protecting indirect branches against fault attacks using ARM pointer authentication

P Nasahl, R Schilling, S Mangard - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Physically exposed embedded devices used in the IoT or automotive area are frequently
targeted by fault attacks. Mitigating this threat is crucial as such attacks can be used to hijack …

FIPAC: Thwarting fault-and software-induced control-flow attacks with ARM pointer authentication

R Schilling, P Nasahl, S Mangard - International Workshop on Constructive …, 2022 - Springer
With improvements in computing technology, more and more applications in the Internet-of-
Things, mobile devices, or automotive area embed powerful ARM processors. These …

μCFI: Formal Verification of Microarchitectural Control-flow Integrity

K Ceesay-Seitz, F Solt, K Razavi - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
Formal verification of hardware often requires the creation of clock-cycle accurate properties
that need tedious and error-prone adaptations for each design. Property violations further …

SAMVA: static analysis for multi-fault attack paths determination

A Gicquel, D Hardy, K Heydemann, E Rohou - International Workshop on …, 2023 - Springer
Multi-fault injection attacks are powerful since they allow to bypass software security
mechanisms of embedded devices. Assessing the vulnerability of an application while …

Countermeasures optimization in multiple fault-injection context

E Boespflug, C Ene, L Mounier… - 2020 Workshop on Fault …, 2020 - ieeexplore.ieee.org
Fault attacks consist in changing the program behavior by injecting faults at run-time, either
at hardware or at software level. Their goal is to change the correct progress of the algorithm …

Verifying redundant-check based countermeasures: a case study

T Martin, N Kosmatov, V Prevosto - … of the 37th ACM/SIGAPP Symposium …, 2022 - dl.acm.org
To thwart fault injection based attacks on critical embedded systems, designers of sensitive
software use redundancy based countermeasure schemes. In some of these schemes …

Using non-autonomous chaotic clocks to drive CPA-resistant AES cryptographic chips

AA El-Moursy, AM Darya, S Majzoub… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this brief, we provide further evidence on the robustness of the chaotic clocking technique
for driving a Correlation Power Analysis (CPA) resistant cryptographic chip running the …