Fault Injection Attack Emulation Framework for Early Evaluation of IC Designs
Abstract
References
Index Terms
- Fault Injection Attack Emulation Framework for Early Evaluation of IC Designs
Recommendations
Side-channel leakage from sensor-based countermeasures against fault injection attack
AbstractIn laser fault injection, an attacker injects laser to a chip implementing cryptography and exploits a fault to attack the cryptography. A promising approach to counteract fault injection attack is to detect an attempt of fault ...
Fault Injection and Dependability Evaluation of Fault-Tolerant Systems
The authors describe a dependability evaluation method based on fault injection that establishes the link between the experimental evaluation of the fault tolerance process and the fault occurrence process. The main characteristics of a fault injection ...
Fault Injection Attack on A5/3
ISPA '11: Proceedings of the 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with ApplicationsIn this paper, we propose a fault injection attack on A5/3 used in GSM. This attack is based on the fault assumption in [9]. That is, it is assumed that we can decrease the number of rounds in block cipher KASUMI of A5/3 by injecting some faults. With ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Transactions on Design Automation of Electronic Systems](/cms/asset/5a3a085b-7b75-4d5b-abe9-3d4884c099f4/3483335.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Journal Family
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Refereed
Funding Sources
- National Natural Science Foundation of China
- Tianjin Municipal Transportation Science and Technology Development Plan
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 184Total Downloads
- Downloads (Last 12 months)51
- Downloads (Last 6 weeks)10
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format