SoK: Assisted Fault Simulation: Existing Challenges and Opportunities Offered by AI

A Adhikary, I Buhan - … Conference on Applied Cryptography and Network …, 2023 - Springer
Fault injection attacks have caused implementations to behave unexpectedly, resulting in a
spectacular bypass of security features and even the extraction of cryptographic keys …

Evolutionary computation and machine learning in security

S Picek, D Jakobovic - Proceedings of the Genetic and Evolutionary …, 2022 - dl.acm.org
Stjepan Picek received his PhD in 2015 as a double doctorate under the supervision of Lejla
Batina, Elena Marchiori (Radboud University Nijmegen, The Netherlands), and Domagoj …

[PDF][PDF] SoK: Assisted Fault Simulation

A Adhikary, I Buhan - Applied Cryp-tography and Network Security …, 2023 - iacr.steepath.eu
Fault injection attacks have caused implementations to behave unexpectedly, resulting in a
spectacular bypass of security features and even the extraction of cryptographic keys …

Diversity Algorithms for Laser Fault Injection

M Krček, T Ordas - International Conference on Applied Cryptography and …, 2024 - Springer
Before third-party evaluation and certification, manufacturers often conduct internal security
evaluations on secure hardware devices, including fault injection (FI). Within this process, FI …

Machine Learning-Based Detection of Glitch Attacks in Clock Signal Data

A Gambra, D Chatterjee, U Rioja… - Cryptology ePrint …, 2024 - eprint.iacr.org
Voltage fault injection attacks are a particularly powerful threat to secure embedded devices
because they exploit brief, hard-to-detect power fluctuations causing errors or bypassing …

Voronoi Based Multidimensional Parameter Optimization for Fault Injection Attacks

M Eggert, M Stöttinger - 2023 Workshop on Fault Detection and …, 2023 - ieeexplore.ieee.org
Fault injection attacks are used to overcome security mechanisms of embedded devices.
While this can be done with low-cost equipment for simple targets and attack types, more …

CGAN-based Automated Fault Injection

TÇ Köylü, CC Berg, P Vadnala - 2024 IEEE European Test …, 2024 - ieeexplore.ieee.org
Fault injection is a major threat to electronic devices. Consequently, developers or
independent test labs spend significant time and effort in identifying fault injection …

[PDF][PDF] Short paper: Diversity Methods for Laser Fault Injection to Improve Location Coverage.

M Krcek, T Ordas, S Picek - IACR Cryptol. ePrint Arch., 2023 - iacr.steepath.eu
In the first step of fault injection attacks, it is necessary to perform fault injections for target
characterization to improve the chances of finding vulnerabilities that can be exploited in the …

Secret Key Recovery Attack on Masked

L Backlund, K Ngo, J Gärtner… - … and Network Security …, 2023 - books.google.com
Shuffling is a well-known countermeasure against sidechannel attacks. It typically uses the
Fisher-Yates (FY) algorithm to generate a random permutation which is then utilized as the …