Hardware private circuits: From trivial composition to full verification

G Cassiers, B Grégoire, I Levi… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The design of glitch-resistant higher-order masking schemes is an important challenge in
cryptographic engineering. A recent work by Moos et al.(CHES 2019) showed that most …

Real-world snapshots vs. theory: Questioning the t-probing security model

T Krachenfels, F Ganji, A Moradi… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Due to its sound theoretical basis and practical efficiency, masking has become the most
prominent countermeasure to protect cryptographic implementations against physical side …

VERICA-Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering

J Richter-Brockmann, J Feldtkeller, P Sasdrich… - Cryptology ePrint …, 2022 - eprint.iacr.org
Physical attacks, including passive Side-Channel Analysis and active Fault Injection
Analysis, are considered among the most powerful threats against physical cryptographic …

Cryptographic fault diagnosis using VerFI

V Arribas, F Wegener, A Moradi… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Historically, fault diagnosis for integrated circuits has singularly dealt with reliability
concerns. In contrast, a cryptographic circuit needs to be primarily evaluated concerning …

[PDF][PDF] COCOALMA: A versatile masking verifier

V Hadzic, R Bloem - CONFERENCE ON FORMAL METHODS IN …, 2021 - library.oapen.org
Masking techniques are an effective countermeasure against power side-channel attacks.
Unfortunately, correctly masking a hardware circuit is difficult, and mistakes may lead to …

SCInfer: Refinement-Based Verification of Software Countermeasures Against Side-Channel Attacks

J Zhang, P Gao, F Song, C Wang - International Conference on Computer …, 2018 - Springer
Power side-channel attacks, capable of deducing secret using statistical analysis
techniques, have become a serious threat to devices in cyber-physical systems and the …

Challenges and opportunities of security-aware EDA

J Feldtkeller, P Sasdrich, T Güneysu - ACM Transactions on Embedded …, 2023 - dl.acm.org
The foundation of every digital system is based on hardware in which security, as a core
service of many applications, should be deeply embedded. Unfortunately, the knowledge of …

A survey and perspective on artificial intelligence for security-aware electronic design automation

D Koblah, R Acharya, D Capecci… - ACM Transactions on …, 2023 - dl.acm.org
Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly
used in several fields to improve performance and the level of automation. In recent years …

Verifying and quantifying side-channel resistance of masked software implementations

P Gao, J Zhang, F Song, C Wang - ACM Transactions on Software …, 2019 - dl.acm.org
Power side-channel attacks, capable of deducing secret data using statistical analysis, have
become a serious threat. Random masking is a widely used countermeasure for removing …

fmdtools: A fault propagation toolkit for resilience assessment in early design

D Hulse, H Walsh, A Dong, C Hoyle… - … of Prognostics and …, 2021 - papers.phmsociety.org
Incorporating resilience in design is important for the long-term viability of complex
engineered systems. Complex aerospace systems, for example, must ensure safety in the …