A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

Electrical-level attacks on CPUs, FPGAs, and GPUs: Survey and implications in the heterogeneous era

DG Mahmoud, V Lenders, M Stojilović - ACM Computing Surveys (CSUR …, 2022 - dl.acm.org
Given the need for efficient high-performance computing, computer architectures combining
central processing units (CPUs), graphics processing units (GPUs), and field-programmable …

SIFA: exploiting ineffective fault inductions on symmetric cryptography

C Dobraunig, M Eichlseder, T Korak… - IACR Transactions on …, 2018 - tches.iacr.org
Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and
techniques for fault attacks and countermeasures have been studied extensively. The vast …

PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications

Y Zheng, W Liu, C Gu, CH Chang - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Peer to Peer (P2P) or direct connection IoT has become increasingly popular owing to its
lower latency and higher privacy compared to database-driven or server-based IoT …

Fault attacks on secure embedded software: Threats, design, and evaluation

B Yuce, P Schaumont, M Witteman - Journal of Hardware and Systems …, 2018 - Springer
Embedded software is developed under the assumption that hardware execution is always
correct. Fault attacks break and exploit that assumption. Through the careful introduction of …

Efficient error detection architectures for postquantum signature falcon's sampler and KEM SABER

A Sarker, MM Kermani… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Among the National Institute for Standards and Technology (NIST) postquantum
cryptography (PQC) standardization Round 3 finalists (announced in 2020 and anticipated …

Impeccable circuits

A Aghaie, A Moradi, S Rasoolzadeh… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
By injecting faults, active physical attacks pose serious threats to cryptographic hardware
where Concurrent Error Detection (CED) schemes are promising countermeasures. They …

Imperceptible misclassification attack on deep learning accelerator by glitch injection

W Liu, CH Chang, F Zhang… - 2020 57th ACM/IEEE …, 2020 - ieeexplore.ieee.org
The convergence of edge computing and deep learning empowers endpoint hardwares or
edge devices to perform inferences locally with the help of deep neural network (DNN) …

[HTML][HTML] WSNEAP: An efficient authentication protocol for IIoT-oriented wireless sensor networks

F Yi, L Zhang, L Xu, S Yang, Y Lu, D Zhao - Sensors, 2022 - mdpi.com
With the development of the Industrial Internet of Things (IIoT), industrial wireless sensors
need to upload the collected private data to the cloud servers, resulting in a large amount of …

Software fault resistance is futile: Effective single-glitch attacks

B Yuce, NF Ghalaty, H Santapuri… - 2016 Workshop on …, 2016 - ieeexplore.ieee.org
Fault attacks are a serious threat for the secure embedded software running on a wide
spectrum of embedded devices. Fault attacks can be thwarted using countermeasures in …