A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

Voltjockey: Breaching trustzone by software-controlled voltage manipulation over multi-core frequencies

P Qiu, D Wang, Y Lyu, G Qu - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
ARM TrustZone builds a trusted execution environment based on the concept of hardware
separation. It has been quite successful in defending against various software attacks and …

CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks

C Beierle, G Leander, A Moradi… - IACR Transactions on …, 2019 - orbilu.uni.lu
Traditionally, countermeasures against physical attacks are integrated into the
implementation of cryptographic primitives after the algorithms have been designed for …

A comprehensive survey on non-invasive fault injection attacks

AM Shuvo, T Zhang, F Farahmandi… - Cryptology ePrint …, 2023 - eprint.iacr.org
Non-invasive fault injection attacks have emerged as significant threats to a spectrum of
microelectronic systems ranging from commodity devices to high-end customized …

SIFA: exploiting ineffective fault inductions on symmetric cryptography

C Dobraunig, M Eichlseder, T Korak… - IACR Transactions on …, 2018 - tches.iacr.org
Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and
techniques for fault attacks and countermeasures have been studied extensively. The vast …

Electromagnetic transient faults injection on a hardware and a software implementations of AES

A Dehbaoui, JM Dutertre, B Robisson… - 2012 Workshop on …, 2012 - ieeexplore.ieee.org
This paper considers the use of electromagnetic pulses (EMP) to inject transient faults into
the calculations of a hardware and a software AES. A pulse generator and a 500 um …

How practical are fault injection attacks, really?

J Breier, X Hou - IEEE Access, 2022 - ieeexplore.ieee.org
Fault injection attacks (FIA) are a class of active physical attacks, mostly used for malicious
purposes such as extraction of cryptographic keys, privilege escalation, attacks on neural …

Hardware designer's guide to fault attacks

D Karaklajić, JM Schmidt… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Hardware designers invest a significant design effort when implementing computationally
intensive cryptographic algorithms onto constrained embedded devices to match the …

Persistent fault analysis on block ciphers

F Zhang, X Lou, X Zhao, S Bhasin, W He… - IACR Transactions on …, 2018 - tches.iacr.org
Persistence is an intrinsic nature for many errors yet has not been caught enough attractions
for years. In this paper, the feature of persistence is applied to fault attacks, and the …

Differential fault intensity analysis

NF Ghalaty, B Yuce, M Taha… - 2014 Workshop on Fault …, 2014 - ieeexplore.ieee.org
Recent research has demonstrated that there is no sharp distinction between passive
attacks based on side-channel leakage and active attacks based on fault injection. Fault …