Systematic classification of side-channel attacks: A case study for mobile devices

R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …

A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

{CLKSCREW}: Exposing the perils of {Security-Oblivious} energy management

A Tang, S Sethumadhavan, S Stolfo - 26th USENIX Security Symposium …, 2017 - usenix.org
The need for power-and energy-efficient computing has resulted in aggressive cooperative
hardware-software energy management mechanisms on modern commodity devices. Most …

Shaping the glitch: optimizing voltage fault injection attacks

C Bozzato, R Focardi, F Palmarini - IACR transactions on …, 2019 - iris.unive.it
Voltage fault injection is a powerful active side channel attack that modifies the execution-
flow of a device by creating disturbances on the power supply line. The attack typically aims …

Oops..! I Glitched It Again! How to {Multi-Glitch} the {Glitching-Protections} on {ARM}{TrustZone-M}

XM Saß, R Mitev, AR Sadeghi - 32nd USENIX Security Symposium …, 2023 - usenix.org
Voltage Fault Injection (VFI), also known as power glitching, has proven to be a severe
threat to real-world systems. In VFI attacks, the adversary disturbs the power-supply of the …

Escalating privileges in linux using voltage fault injection

N Timmers, C Mune - 2017 Workshop on Fault Diagnosis and …, 2017 - ieeexplore.ieee.org
Today's standard embedded device technology is not robust against Fault Injection (FI)
attacks such as Voltage Fault Injection (V-FI). FI attacks can be used to alter the intended …

A comprehensive survey on non-invasive fault injection attacks

AM Shuvo, T Zhang, F Farahmandi… - Cryptology ePrint …, 2023 - eprint.iacr.org
Non-invasive fault injection attacks have emerged as significant threats to a spectrum of
microelectronic systems ranging from commodity devices to high-end customized …

[HTML][HTML] A Novel Approach of a Low-Cost Voltage Fault Injection Method for Resource-Constrained IoT Devices: Design and Analysis

N Ruminot, C Estevez, S Montejo-Sánchez - Sensors, 2023 - mdpi.com
The rapid development of the Internet of Things (IoT) has brought about the processing and
storage of sensitive information on resource-constrained devices, which are susceptible to …

Pufmon: Security monitoring of fpgas using physically unclonable functions

S Tajik, J Fietkau, H Lohrke… - 2017 IEEE 23rd …, 2017 - ieeexplore.ieee.org
Mainstream FPGAs and programmable SoCs employ different countermeasures during
configuration and runtime to mitigate physical attacks. However, it has been demonstrated …

Secure physical design

S Dey, J Park, N Pundir, D Saha, AM Shuvo… - Cryptology ePrint …, 2022 - eprint.iacr.org
An integrated circuit is subject to a number of attacks including information leakage, side-
channel attacks, fault-injection, malicious change, reverse engineering, and piracy. Majority …