Introduction to hardware security

Y ** - Electronics, 2015 - mdpi.com
Hardware security has become a hot topic recently with more and more researchers from
related research domains joining this area. However, the understanding of hardware …

Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures

A Barenghi, L Breveglieri, I Koren… - Proceedings of the …, 2012 - ieeexplore.ieee.org
Implementations of cryptographic algorithms continue to proliferate in consumer products
due to the increasing demand for secure transmission of confidential information. Although …

Voltjockey: Breaching trustzone by software-controlled voltage manipulation over multi-core frequencies

P Qiu, D Wang, Y Lyu, G Qu - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
ARM TrustZone builds a trusted execution environment based on the concept of hardware
separation. It has been quite successful in defending against various software attacks and …

VoltJockey: Breaking SGX by software-controlled voltage-induced hardware faults

P Qiu, D Wang, Y Lyu, G Qu - 2019 Asian Hardware Oriented …, 2019 - ieeexplore.ieee.org
Intel software-guard extensions (SGX) allows applications to run in a trusted space
(enclave), which provides a highly secure primitive for the running codes and data. Most …

Emerging technology-based design of primitives for hardware security

Y Bi, K Shamsi, JS Yuan, PE Gaillardon… - ACM Journal on …, 2016 - dl.acm.org
Hardware security concerns such as intellectual property (IP) piracy and hardware Trojans
have triggered research into circuit protection and malicious logic detection from various …

Fault injection using crowbars on embedded systems

C O'Flynn - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Causing a device to incorrectly execute an instruction or store faulty data is well-known
strategy for attacking cryptographic implementations on embedded systems. One technique …

Leveraging emerging technology for hardware security-case study on silicon nanowire fets and graphene symfets

Y Bi, PE Gaillardon, XS Hu, M Niemier… - 2014 IEEE 23rd …, 2014 - ieeexplore.ieee.org
Hardware security concerns such as IP piracy and hardware Trojans have triggered
research into circuit protection and malicious logic detection from various design …

Voltjockey: A new dynamic voltage scaling-based fault injection attack on intel sgx

P Qiu, D Wang, Y Lyu, R Tian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Intel software guard extensions (SGX) increase the security of applications by enabling them
to be performed in a highly trusted space (called enclave). Most state-of-the-art attacks on …

Key Generation using Curve Fitting for Polynomial based Cryptography

KR Ramkumar, T Hasija, B Singh… - 2023 7th International …, 2023 - ieeexplore.ieee.org
Every organization's primary concern is security. A cryptography method will remain safe in
the system if the key is not cracked by a hacker through any kind of attacks. A conventional …

Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem

PL Cayrel, B Colombier, VF Drăgoi, A Menu… - … Conference on the …, 2021 - Springer
Code-based public-key cryptosystems are promising candidates for standardization as
quantum-resistant public-key cryptographic algorithms. Their security is based on the …