A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography

X Lou, T Zhang, J Jiang, Y Zhang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Side-channel attacks have become a severe threat to the confidentiality of computer
applications and systems. One popular type of such attacks is the microarchitectural attack …

A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

Fault attacks in symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

Classical and physical security of symmetric key cryptographic algorithms

A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …

SAFARI: Automatic synthesis of fault-attack resistant block cipher implementations

I Roy, C Rebeiro, A Hazra… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Most cipher implementations are vulnerable to a class of cryptanalytic attacks known as fault
injection attacks. To reveal the secret key, these attacks make use of faults induced at …

SOLOMON: An automated framework for detecting fault attack vulnerabilities in hardware

M Srivastava, P Slpsk, I Roy, C Rebeiro… - … , Automation & Test …, 2020 - ieeexplore.ieee.org
Fault attacks are potent physical attacks on crypto-devices. A single fault injected during
encryption can reveal the cipher's secret key. In a hardware realization of an encryption …

A hybrid approach to formal verification of higher-order masked arithmetic programs

P Gao, H Xie, F Song, T Chen - ACM Transactions on Software …, 2021 - dl.acm.org
Side-channel attacks, which are capable of breaking secrecy via side-channel information,
pose a growing threat to the implementation of cryptographic algorithms. Masking is an …

Finding and exploiting faults in hardware and software

K Murdock - 2023 - etheses.bham.ac.uk
Computers are constantly being enhanced to improve their speed, size, security, and energy
consumption. Dynamic Voltage and Frequency Scaling (DVFS) improves energy efficiency …

FEDS: Comprehensive fault attack exploitability detection for software implementations of block ciphers

K Keerthi, I Roy, C Rebeiro, A Hazra… - IACR Transactions on …, 2020 - tches.iacr.org
Fault injection attacks are one of the most powerful forms of cryptanalytic attacks on ciphers.
A single, precisely injected fault during the execution of a cipher like the AES, can …

SoK: Assisted Fault Simulation: Existing Challenges and Opportunities Offered by AI

A Adhikary, I Buhan - … Conference on Applied Cryptography and Network …, 2023 - Springer
Fault injection attacks have caused implementations to behave unexpectedly, resulting in a
spectacular bypass of security features and even the extraction of cryptographic keys …