An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Tamper resistance mechanisms for secure embedded systems

S Ravi, A Raghunathan… - … Conference on VLSI …, 2004 - ieeexplore.ieee.org
Security is a concern in the design of a wide range of embedded systems. Extensive
research has been devoted to the development of cryptographic algorithms that provide the …

CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks

C Beierle, G Leander, A Moradi… - IACR Transactions on …, 2019 - orbilu.uni.lu
Traditionally, countermeasures against physical attacks are integrated into the
implementation of cryptographic primitives after the algorithms have been designed for …

Context-sensitive fencing: Securing speculative execution via microcode customization

M Taram, A Venkat, D Tullsen - Proceedings of the Twenty-Fourth …, 2019 - dl.acm.org
This paper describes context-sensitive fencing (CSF), a microcode-level defense against
multiple variants of Spectre. CSF leverages the ability to dynamically alter the decoding of …

Hardware designer's guide to fault attacks

D Karaklajić, JM Schmidt… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Hardware designers invest a significant design effort when implementing computationally
intensive cryptographic algorithms onto constrained embedded devices to match the …

Recent attacks and defenses on FPGA-based systems

J Zhang, G Qu - ACM Transactions on Reconfigurable Technology and …, 2019 - dl.acm.org
Field-programmable gate array (FPGA) is a kind of programmable chip that is widely used in
many areas, including automotive electronics, medical devices, military and consumer …

Securing designs against scan-based side-channel attacks

J Lee, M Tehranipoor, C Patel… - IEEE transactions on …, 2007 - ieeexplore.ieee.org
Traditionally, the only standard method of testing that has consistently provided high fault
coverage has been scan test due to the high controllability and high observability this …

Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard

M Karpovsky, KJ Kulikowski… - … on Dependable Systems …, 2004 - ieeexplore.ieee.org
We present a method of protecting a hardware implementation of the advanced encryption
standard (AES) against a side-channel attack known as differential fault analysis attack. The …

Simple error detection methods for hardware implementation of advanced encryption standard

CH Yen, BF Wu - IEEE transactions on computers, 2006 - ieeexplore.ieee.org
In order to prevent the Advanced Encryption Standard (AES) from suffering from differential
fault attacks, the technique of error detection can be adopted to detect the errors during …

Impeccable circuits

A Aghaie, A Moradi, S Rasoolzadeh… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
By injecting faults, active physical attacks pose serious threats to cryptographic hardware
where Concurrent Error Detection (CED) schemes are promising countermeasures. They …