An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

SIFA: exploiting ineffective fault inductions on symmetric cryptography

C Dobraunig, M Eichlseder, T Korak… - IACR Transactions on …, 2018 - tches.iacr.org
Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and
techniques for fault attacks and countermeasures have been studied extensively. The vast …

ParTI–towards combined hardware countermeasures against side-channel and fault-injection attacks

T Schneider, A Moradi, T Güneysu - … , Santa Barbara, CA, USA, August 14 …, 2016 - Springer
Side-channel analysis and fault-injection attacks are known as major threats to any
cryptographic implementation. Hardening cryptographic implementations with appropriate …

Impeccable circuits

A Aghaie, A Moradi, S Rasoolzadeh… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
By injecting faults, active physical attacks pose serious threats to cryptographic hardware
where Concurrent Error Detection (CED) schemes are promising countermeasures. They …

Attack on a DFA protected AES by simultaneous laser fault injections

B Selmke, J Heyszl, G Sigl - 2016 Workshop on Fault …, 2016 - ieeexplore.ieee.org
This paper demonstrates a Fault Attack on anAES core protected by an infection type
countermeasure. The redundant AES is implemented on a Xilinx Spartan-6FPGA, with a …

Reliable hardware architectures for cryptographic block ciphers LED and HIGHT

S Subramanian, M Mozaffari-Kermani… - … on Computer-Aided …, 2017 - ieeexplore.ieee.org
Cryptographic architectures provide different security properties to sensitive usage models.
However, unless reliability of architectures is guaranteed, such security properties can be …

A comprehensive survey on non-invasive fault injection attacks

AM Shuvo, T Zhang, F Farahmandi… - Cryptology ePrint …, 2023 - eprint.iacr.org
Non-invasive fault injection attacks have emerged as significant threats to a spectrum of
microelectronic systems ranging from commodity devices to high-end customized …

Quantifiable assurance: from IPs to platforms

B Ahmed, MK Bepary, N Pundir, M Borza… - arXiv preprint arXiv …, 2022 - arxiv.org
Hardware vulnerabilities are generally considered more difficult to fix than software ones
because they are persistent after fabrication. Thus, it is crucial to assess the security and fix …

Fault diagnosis schemes for low-energy block cipher Midori benchmarked on FPGA

A Aghaie, MM Kermani… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Achieving secure high-performance implementations for constrained applications such as
implantable and wearable medical devices are a priority in efficient block ciphers. However …