Electrical-level attacks on CPUs, FPGAs, and GPUs: Survey and implications in the heterogeneous era

DG Mahmoud, V Lenders, M Stojilović - ACM Computing Surveys (CSUR …, 2022 - dl.acm.org
Given the need for efficient high-performance computing, computer architectures combining
central processing units (CPUs), graphics processing units (GPUs), and field-programmable …

Impeccable circuits

A Aghaie, A Moradi, S Rasoolzadeh… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
By injecting faults, active physical attacks pose serious threats to cryptographic hardware
where Concurrent Error Detection (CED) schemes are promising countermeasures. They …

Oops..! I Glitched It Again! How to {Multi-Glitch} the {Glitching-Protections} on {ARM}{TrustZone-M}

XM Saß, R Mitev, AR Sadeghi - 32nd USENIX Security Symposium …, 2023 - usenix.org
Voltage Fault Injection (VFI), also known as power glitching, has proven to be a severe
threat to real-world systems. In VFI attacks, the adversary disturbs the power-supply of the …

Fill your boots: Enhanced embedded bootloader exploits via fault injection and binary analysis

J Van den Herrewegen, D Oswald… - IACR Transactions on …, 2021 - tches.iacr.org
The bootloader of an embedded microcontroller is responsible for guarding the device's
internal (flash) memory, enforcing read/write protection mechanisms. Fault injection …

Fault injection using crowbars on embedded systems

C O'Flynn - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Causing a device to incorrectly execute an instruction or store faulty data is well-known
strategy for attacking cryptographic implementations on embedded systems. One technique …

Fault attacks on STRNGs: Impact of glitches, temperature, and underpowering on randomness

H Martin, T Korak, E San Millán… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
True random number generators (TRNGs) are the basic building blocks of cryptographic
implementations. They are used to generate random numbers required for security …

Evolutionary algorithms for boolean functions in diverse domains of cryptography

S Picek, C Carlet, S Guilley, JF Miller… - Evolutionary …, 2016 - ieeexplore.ieee.org
The role of Boolean functions is prominent in several areas including cryptography,
sequences, and coding theory. Therefore, various methods for the construction of Boolean …

ARMORY: Fully Automated and Exhaustive Fault Simulation on ARM-M Binaries

M Hoffmann, F Schellenberg… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Embedded systems are ubiquitous. However, physical access of users and likewise
attackers makes them often threatened by fault attacks: a single fault during the computation …

An end-to-end approach for multi-fault attack vulnerability assessment

V Werner, L Maingault, ML Potet - 2020 Workshop on Fault …, 2020 - ieeexplore.ieee.org
Although multi-fault attacks are extremely powerful in defeating sophisticated hardware and
software defences, detecting and exploiting such attacks remains a difficult problem …

SoK: Assisted Fault Simulation: Existing Challenges and Opportunities Offered by AI

A Adhikary, I Buhan - … Conference on Applied Cryptography and Network …, 2023 - Springer
Fault injection attacks have caused implementations to behave unexpectedly, resulting in a
spectacular bypass of security features and even the extraction of cryptographic keys …