A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Precise fault-injections using voltage and temperature manipulation for differential cryptanalysis
2014
2014 IEEE 20th International On-Line Testing Symposium (IOLTS)
We investigate selection of supply-voltage and temperature values that are suitable for high-precision fault injection even up to a single bit. ...
However, they require temporal and spatial accuracies of fault injection that were believed to rule out low-cost injection techniques such as voltage, frequency or temperature manipulation. ...
We demonstrated that low-cost voltage and temperature manipulations can be used for high-precision fault injection required to break recent ciphers. ...
doi:10.1109/iolts.2014.6873670
dblp:conf/iolts/KumarJP14
fatcat:gybee5fm5rb4dertw36nsv246u
Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware
2014
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography
Full circuit-level simulation followed by differential cryptanalysis demonstrate that the secret key can be reconstructed after around 5 fault-injections. ...
These Trojans are activated with very low probability under the presence of a slightly reduced supply voltage (0.001 for 20% V dd reduction). ...
We use this circuit for Trojan-based fault injection and cryptanalysis.
C. Differential Fault Analysis of PRINCE The differential fault analysis on PRINCE is performed in two stages. ...
doi:10.1109/fdtc.2014.12
dblp:conf/fdtc/KumarJBP14
fatcat:mwyiux2wsfgkvputirgmrkytua
Fault Attacks on Secure Embedded Software: Threats, Design and Evaluation
[article]
2020
arXiv
pre-print
The modified program execution is then analyzed and used as a source of information leakage, or as a mechanism for privilege escalation. ...
For example, the assumption that an adversary has to be close to the physical execution of software, in order to inject an exploitable fault into hardware, has repeatedly been shown to be incorrect. ...
ACKNOWLEDGEMENTS The authors would like to thank Dennis Vermoen from Riscure Security Lab for his help and support. ...
arXiv:2003.10513v1
fatcat:paebhdl4cjhfvp7o5skttooyym
Fault Attacks In Symmetric Key Cryptosystems
[article]
2020
IACR Cryptology ePrint Archive
and going to stay as an active research interest for a foreseeable future. ...
Fault attacks are among the well-studied topics in the area of cryptography. These attacks constitute a powerful tool to recover the secret key used in the encryption process. ...
The disturbances could be injected by means of, for example, voltage glitches, Light Amplification by Stimulated Emission of Radiation (LASER) shots, sudden temperature variations. ...
dblp:journals/iacr/BaksiBBJS20
fatcat:dln4jkk6mvb33okcmlwrkkjm54
Power-based Side Channel Analysis and Fault Injection: Hacking Techniques and Combined Countermeasure
2021
International Journal of Advanced Computer Science and Applications
Hence, the majority of these secured approaches are used for precise and single attack and it is difficult to thwart hybrid attack, such as combined power and fault attacks. ...
In this work, the Advanced Encryption Standard is used as a case study in order to analyse the most well-known physical-based Hacking techniques: Differential Fault Analysis (DFA) and Correlation Power ...
The fault injection is done by means of Electromagnetic field, supply voltage variation, laser beam, or temperature control. ...
doi:10.14569/ijacsa.2021.0120583
fatcat:3rgsgj7nf5eqxdhjfwf6xpa6wu
Smart Card Security
[chapter]
2013
Secure Smart Embedded Devices, Platforms and Applications
In this chapter, a description of the various attacks and countermeasures that apply to secure smart card applications are described. ...
Faults in DES A type of cryptanalysis of ciphertext blocks produced by injecting faults into DES was proposed in [8] , based on using techniques used in differential cryptanalysis [31] . ...
These are used to detect unusual events in the voltage and clock supplied to the card, and the environmental conditions (e.g. the temperature). ...
doi:10.1007/978-1-4614-7915-4_7
fatcat:wcsmbryrezhjfksojwwa2rb2kq
Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis
[article]
2021
arXiv
pre-print
In total, we comprehensively survey over 50 fault injection and side-channel attack papers published between 2009-2021. ...
In this survey, we consolidate recent developments in physical fault injections and side-channel attacks on modern mobile devices. ...
The authors would like to thank the EXFILES WP5 project partners for comments and discussions around the topic of this work. ...
arXiv:2105.04454v5
fatcat:27ldfag7ejgvxh7cbs2qnevb24
Plundervolt: Software-based Fault Injection Attacks against Intel SGX
2020
2020 IEEE Symposium on Security and Privacy (SP)
Design restrictions ensure frequency and voltage are adjusted as a pair, based on the current load, because for each frequency there is only a certain voltage range where the processor can operate correctly ...
For this purpose, many processors (including the widespread Intel Core series) expose privileged software interfaces to dynamically regulate processor frequency and operating voltage. ...
ACKNOWLEDGMENTS This research is partially funded by the Research Fund KU Leuven, and by the Agency for Innovation and Entrepreneurship (Flanders). ...
doi:10.1109/sp40000.2020.00057
dblp:conf/sp/MurdockOGBGP20
fatcat:hk23tfteyrb3pbp7gkczqgp4re
Plundervolt: Software-based Fault Injection Attacks against Intel SGX
2020
Zenodo
Design restrictions ensure frequency and voltage are adjusted as a pair, based on the current load, because for each frequency there is only a certain voltage range where the processor can operate correctly ...
For this purpose, many processors (including the widespread Intel Core series) expose privileged software interfaces to dynamically regulate processor frequency and operating voltage. ...
ACKNOWLEDGMENTS This research is partially funded by the Research Fund KU Leuven, and by the Agency for Innovation and Entrepreneurship (Flanders). ...
doi:10.5281/zenodo.3952135
fatcat:67z2ko4p4rcgfbt6gvykbyviyi
A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices
[chapter]
2010
Lecture Notes in Computer Science
The corresponding data acquisition system for side-channel attacks makes precise power and EM analyses possible. ...
We introduce several methods for the automatic profiling of cryptographic devices and model their behaviour both with respect to side-channel analysis and fault injection. ...
., power analysis (Differential Power Analysis (DPA), Simple Power Analysis (SPA), template attacks), and active attacks, i.e., fault injection or microprobing. ...
doi:10.1007/978-3-642-17499-5_5
fatcat:yd7vx5jw5vh2boctlr2z2hjxcm
The Sorcerer's Apprentice Guide to Fault Attacks
2006
Proceedings of the IEEE
Since then various mechanisms for fault creation and propagation have been discovered and researched. ...
This paper covers the various methods that can be used to induce faults in semiconductors and exploit such errors maliciously. ...
Using the techniques of differential cryptanalysis, we obtain about five bits of information about the eight key bits that were not xor'ed as a result of the induced fault. ...
doi:10.1109/jproc.2005.862424
fatcat:djg7jmfjxbdjbpm3mehfbjqjtu
Hardware Designer's Guide to Fault Attacks
2013
IEEE Transactions on Very Large Scale Integration (vlsi) Systems
We analyze fault attacks from different aspects and expose the mechanisms they employ to reveal a secret parameter of a device. ...
This paper gives an insight into the field of fault attacks and countermeasures to help the designer to protect the design against this type of implementation attacks. ...
Afterwards, a technique from cryptoanalysis, the differential cryptanalysis, is applied to construct and solve differential fault equations in order to deduce bits of the secret key. ...
doi:10.1109/tvlsi.2012.2231707
fatcat:4mhbkwfw3jgttptpc6ck5czwba
Hardware Countermeasures Benchmarking against Fault Attacks
2022
Applied Sciences
The development of differential fault analysis (DFA) techniques and mechanisms to inject faults into cryptographic circuits brings with it the need to use protection mechanisms that guarantee the expected ...
The eight different types of fault that allow us to perform DFAs on the AES cipher have been differentiated, as well as the vulnerabilities of the cipher. ...
Acknowledgments: Authors want to acknowledge to projects Programa Operativo FEDER 2014-2020 and Consejería de Economía, Conocimiento, Empresas y Universidad de la Junta de Andalucía under Project US-1380823 ...
doi:10.3390/app12052443
fatcat:ljycbggo7vf6xeded2mbqychx4
Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection
[chapter]
2006
Lecture Notes in Computer Science
They make no assumptions about what faults or errors will be injected by an attacker and have fewer undetectable errors than linear codes with the same (n,k). ...
We also present optimization approaches which provide for a tradeoff between the levels of robustness and required overhead for hardware implementations. ...
The multiplicity of faults can be controlled by manipulating the fault injection mechanisms such as the level of radiation, temperature, etc. ...
doi:10.1007/11889700_17
fatcat:hld5ghd2qvclfpwjfie6bfibne
Beware of Insufficient Redundancy
2022
Transactions on Cryptographic Hardware and Embedded Systems
In our case, a standard black-box scan over the target using a common single-shot LFI setup is sufficient to occasionally inject more single-bit faults than those bounded by the underlying adversary model ...
Fault injection attacks pose a serious threat to cryptographic implementations. Countermeasures beyond sensors and shields usually deploy some form of redundancy to detect or even correct errors. ...
406956718 'SuCCESS' and by the European Union (EU) through the ERC project 724725 (acronym SWORD). ...
doi:10.46586/tches.v2022.i3.438-462
fatcat:uovltmacl5fw3nrvyoocxkc2zm
« Previous
Showing results 1 — 15 out of 54 results