搜索结果: 1-13 共查到“军队指挥学 Fault injection”相关记录13条 . 查询时间(0.046 秒)
A Fast Characterization Method for Optical Fault Injection
Physical attacks Fault injection Fast space characterization
font style='font-size:12px;'>
2019/7/26
Semi-invasive fault injection attacks, such as optical fault injection, are powerful techniques well-known by attackers and secure embedded system designers. When performing such attacks, the selectio...
Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks
fault attack neural network deep learning
font style='font-size:12px;'>
2019/5/13
Deep learning is becoming a basis of decision making systems in many application domains, such as autonomous vehicles, health systems, etc., where the risk of misclassification can lead to serious con...
Practical Fault Injection Attacks on SPHINCS
SPHINCS hash-based signature voltage glitching
font style='font-size:12px;'>
2018/7/16
The majority of currently deployed cryptographic public-key schemes are at risk of becoming insecure once large scale quantum computers become practical. Therefore, substitutes resistant to quantum at...
Template-based Fault Injection Analysis of Block Ciphers
Template Attacks Fault Injection Fault Intensity
font style='font-size:12px;'>
2018/1/19
We present the first template-based fault injection analysis of FPGA-based block cipher implementations. While template attacks have been a popular form of side-channel analysis in the cryptographic l...
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks
secret sharing AES fault attacks
font style='font-size:12px;'>
2017/3/27
Side channel analysis and fault attacks are two powerful methods to analyze and break cryptographic implementations. Recently, secure multiparty computation has been applied to prevent side channel at...
Fault Injection using Crowbars on Embedded Systems
fault injection voltage faulting
font style='font-size:12px;'>
2016/12/10
Causing a device to incorrectly execute an instruction or store faulty data is well-known strategy for attacking cryptographic implementations on embedded systems. One technique to generate such fault...
Mistakes Are Proof That You Are Trying: On Verifying Software Encoding Schemes' Resistance to Fault Injection Attacks
software encoding schemes formal code analysis fault injection attacks
font style='font-size:12px;'>
2016/12/8
Software encoding countermeasures are becoming increasingly popular among researchers proposing code-level prevention against data-dependent leakage allowing an attacker to mount a side-channel attack...
On Analyzing Program Behavior Under Fault Injection Attacks
fault attacks fault simulator instruction set simulator
font style='font-size:12px;'>
2016/12/7
Fault attacks pose a serious threat to cryptographic algorithm implementations. It is a non-trivial task to design a code that minimizes the risk of exploiting the incorrect output that was produced b...
ParTI -- Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks
side-channel analysis fault injection countermeasure
font style='font-size:12px;'>
2016/6/27
Side-channel analysis and fault-injection attacks are known as major threats to any cryptographic implementation. Hardening cryptographic implementations with appropriate countermeasures is thus essen...
Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA
RSA CRT fault injection
font style='font-size:12px;'>
2016/1/8
In this paper we study the existing CRT-RSA countermeasures against fault-injection attacks.
In an attempt to classify them we get to achieve deep understanding of how they work.
We show that the ma...
Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware
fault-based cryptanalysis fault injection hardware Trojans
font style='font-size:12px;'>
2016/1/6
We propose two extremely stealthy hardware Trojans that facilitate fault-injection attacks in cryptographic blocks. The Trojans are carefully inserted to modify the electrical characteristics of prede...
A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA
RSA CRT
font style='font-size:12px;'>
2014/3/10
In this article, we describe a methodology that aims at either breaking or proving the security of CRT-RSA implementations against fault injection attacks. In the specific case-study of the BellCoRe a...
Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes
Modeling Attacks Environmental Changes
font style='font-size:12px;'>
2014/3/7
Physically Unclonable Functions (PUFs) are emerging as hardware security primitives. So-called strong PUFs provide a mechanism to authenticate chips which is inherently unique for every manufactured s...