A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

How practical are fault injection attacks, really?

J Breier, X Hou - IEEE Access, 2022 - ieeexplore.ieee.org
Fault injection attacks (FIA) are a class of active physical attacks, mostly used for malicious
purposes such as extraction of cryptographic keys, privilege escalation, attacks on neural …

Oops..! I Glitched It Again! How to {Multi-Glitch} the {Glitching-Protections} on {ARM}{TrustZone-M}

XM Saß, R Mitev, AR Sadeghi - 32nd USENIX Security Symposium …, 2023 - usenix.org
Voltage Fault Injection (VFI), also known as power glitching, has proven to be a severe
threat to real-world systems. In VFI attacks, the adversary disturbs the power-supply of the …

IoT-HarPSecA: a framework and roadmap for secure design and development of devices and applications in the IoT space

MG Samaila, JBF Sequeiros, T Simoes… - IEEE …, 2020 - ieeexplore.ieee.org
The past couple of years have marked continued growth in the applications and services of
the Internet of Things (IoT). This has attracted the attention of new operators as well as …

Fault attacks in symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

On the building of efficient self-adaptable health data science services by using dynamic patterns

G Sanchez-Gallegos, DD Sanchez-Gallegos… - Future Generation …, 2023 - Elsevier
Health data science systems are becoming key for supporting healthcare decision-making
processes. However, these systems should achieve continuous data processing and adapt …

Classical and physical security of symmetric key cryptographic algorithms

A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …

Genetic algorithm-based electromagnetic fault injection

A Maldini, N Samwel, S Picek… - 2018 Workshop on Fault …, 2018 - ieeexplore.ieee.org
Electromagnetic fault injection (EMFI) is a powerful active attack, requiring minimal
modifications of the device under attack while having excellent penetration capabilities. The …

Algebraic fault analysis of SHA-3 under relaxed fault models

P Luo, K Athanasiou, Y Fei… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As the new hash standard, Keccak-based secure hash function (SHA-3) will be used in
various cryptographic applications. Its security will be of paramount importance to the …

Optimizing electromagnetic fault injection with genetic algorithms

A Maldini, N Samwel, S Picek, L Batina - Automated Methods in …, 2019 - Springer
Fault injection is a serious threat for implementations of cryptography, especially on small
embedded devices. In particular, electromagnetic fault injection (EMFI) is a powerful active …