An overview of hardware security and trust: Threats, countermeasures, and design tools
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
Tamper resistance mechanisms for secure embedded systems
S Ravi, A Raghunathan… - … Conference on VLSI …, 2004 - ieeexplore.ieee.org
Security is a concern in the design of a wide range of embedded systems. Extensive
research has been devoted to the development of cryptographic algorithms that provide the …
research has been devoted to the development of cryptographic algorithms that provide the …
CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks
Traditionally, countermeasures against physical attacks are integrated into the
implementation of cryptographic primitives after the algorithms have been designed for …
implementation of cryptographic primitives after the algorithms have been designed for …
Context-sensitive fencing: Securing speculative execution via microcode customization
This paper describes context-sensitive fencing (CSF), a microcode-level defense against
multiple variants of Spectre. CSF leverages the ability to dynamically alter the decoding of …
multiple variants of Spectre. CSF leverages the ability to dynamically alter the decoding of …
Hardware designer's guide to fault attacks
D Karaklajić, JM Schmidt… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Hardware designers invest a significant design effort when implementing computationally
intensive cryptographic algorithms onto constrained embedded devices to match the …
intensive cryptographic algorithms onto constrained embedded devices to match the …
Recent attacks and defenses on FPGA-based systems
J Zhang, G Qu - ACM Transactions on Reconfigurable Technology and …, 2019 - dl.acm.org
Field-programmable gate array (FPGA) is a kind of programmable chip that is widely used in
many areas, including automotive electronics, medical devices, military and consumer …
many areas, including automotive electronics, medical devices, military and consumer …
Securing designs against scan-based side-channel attacks
J Lee, M Tehranipoor, C Patel… - IEEE transactions on …, 2007 - ieeexplore.ieee.org
Traditionally, the only standard method of testing that has consistently provided high fault
coverage has been scan test due to the high controllability and high observability this …
coverage has been scan test due to the high controllability and high observability this …
Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard
M Karpovsky, KJ Kulikowski… - … on Dependable Systems …, 2004 - ieeexplore.ieee.org
We present a method of protecting a hardware implementation of the advanced encryption
standard (AES) against a side-channel attack known as differential fault analysis attack. The …
standard (AES) against a side-channel attack known as differential fault analysis attack. The …
Simple error detection methods for hardware implementation of advanced encryption standard
CH Yen, BF Wu - IEEE transactions on computers, 2006 - ieeexplore.ieee.org
In order to prevent the Advanced Encryption Standard (AES) from suffering from differential
fault attacks, the technique of error detection can be adopted to detect the errors during …
fault attacks, the technique of error detection can be adopted to detect the errors during …
Impeccable circuits
By injecting faults, active physical attacks pose serious threats to cryptographic hardware
where Concurrent Error Detection (CED) schemes are promising countermeasures. They …
where Concurrent Error Detection (CED) schemes are promising countermeasures. They …