SoK: Assisted Fault Simulation: Existing Challenges and Opportunities Offered by AI
A Adhikary, I Buhan - … Conference on Applied Cryptography and Network …, 2023 - Springer
Fault injection attacks have caused implementations to behave unexpectedly, resulting in a
spectacular bypass of security features and even the extraction of cryptographic keys …
spectacular bypass of security features and even the extraction of cryptographic keys …
Evolutionary computation and machine learning in security
S Picek, D Jakobovic - Proceedings of the Genetic and Evolutionary …, 2022 - dl.acm.org
Stjepan Picek received his PhD in 2015 as a double doctorate under the supervision of Lejla
Batina, Elena Marchiori (Radboud University Nijmegen, The Netherlands), and Domagoj …
Batina, Elena Marchiori (Radboud University Nijmegen, The Netherlands), and Domagoj …
[PDF][PDF] SoK: Assisted Fault Simulation
A Adhikary, I Buhan - Applied Cryp-tography and Network Security …, 2023 - iacr.steepath.eu
Fault injection attacks have caused implementations to behave unexpectedly, resulting in a
spectacular bypass of security features and even the extraction of cryptographic keys …
spectacular bypass of security features and even the extraction of cryptographic keys …
Diversity Algorithms for Laser Fault Injection
M Krček, T Ordas - International Conference on Applied Cryptography and …, 2024 - Springer
Before third-party evaluation and certification, manufacturers often conduct internal security
evaluations on secure hardware devices, including fault injection (FI). Within this process, FI …
evaluations on secure hardware devices, including fault injection (FI). Within this process, FI …
Machine Learning-Based Detection of Glitch Attacks in Clock Signal Data
A Gambra, D Chatterjee, U Rioja… - Cryptology ePrint …, 2024 - eprint.iacr.org
Voltage fault injection attacks are a particularly powerful threat to secure embedded devices
because they exploit brief, hard-to-detect power fluctuations causing errors or bypassing …
because they exploit brief, hard-to-detect power fluctuations causing errors or bypassing …
Voronoi Based Multidimensional Parameter Optimization for Fault Injection Attacks
M Eggert, M Stöttinger - 2023 Workshop on Fault Detection and …, 2023 - ieeexplore.ieee.org
Fault injection attacks are used to overcome security mechanisms of embedded devices.
While this can be done with low-cost equipment for simple targets and attack types, more …
While this can be done with low-cost equipment for simple targets and attack types, more …
CGAN-based Automated Fault Injection
Fault injection is a major threat to electronic devices. Consequently, developers or
independent test labs spend significant time and effort in identifying fault injection …
independent test labs spend significant time and effort in identifying fault injection …
[PDF][PDF] Short paper: Diversity Methods for Laser Fault Injection to Improve Location Coverage.
In the first step of fault injection attacks, it is necessary to perform fault injections for target
characterization to improve the chances of finding vulnerabilities that can be exploited in the …
characterization to improve the chances of finding vulnerabilities that can be exploited in the …
Secret Key Recovery Attack on Masked
Shuffling is a well-known countermeasure against sidechannel attacks. It typically uses the
Fisher-Yates (FY) algorithm to generate a random permutation which is then utilized as the …
Fisher-Yates (FY) algorithm to generate a random permutation which is then utilized as the …