How practical are fault injection attacks, really?

J Breier, X Hou - IEEE Access, 2022 - ieeexplore.ieee.org
Fault injection attacks (FIA) are a class of active physical attacks, mostly used for malicious
purposes such as extraction of cryptographic keys, privilege escalation, attacks on neural …

Oops..! I Glitched It Again! How to {Multi-Glitch} the {Glitching-Protections} on {ARM}{TrustZone-M}

XM Saß, R Mitev, AR Sadeghi - 32nd USENIX Security Symposium …, 2023 - usenix.org
Voltage Fault Injection (VFI), also known as power glitching, has proven to be a severe
threat to real-world systems. In VFI attacks, the adversary disturbs the power-supply of the …

Stealing keys from hardware wallets: A single trace side-channel attack on elliptic curve scalar multiplication without profiling

D Park, M Choi, G Kim, D Bae, H Kim, S Hong - IEEE Access, 2023 - ieeexplore.ieee.org
Over the past decade, decentralized cryptocurrencies have received attention in industry
and academia. Hardware wallets are dedicated devices that manage cryptocurrencies …

Practical, low-cost fault injection attacks on personal smart devices

S Delarea, Y Oren - Applied Sciences, 2022 - mdpi.com
Fault attacks are traditionally considered under a threat model that assumes the device
under test is in the possession of the attacker. We propose a variation on this model. In our …

Faulting Winternitz One-Time Signatures to Forge LMS, XMSS, or Signatures

A Wagner, V Wesselkamp, F Oberhansl… - … Conference on Post …, 2023 - Springer
Hash-based signature (HBS) schemes are an efficient method of guaranteeing the
authenticity of data in a post-quantum world. The stateful schemes LMS and XMSS and the …

Extended version—to be, or not to be stateful: post-quantum secure boot using hash-based signatures

A Wagner, F Oberhansl, M Schink - Journal of Cryptographic Engineering, 2024 - Springer
While research in PQC has gained significant momentum, its adoption in real-world products
is slow. This is largely due to concerns about practicability and maturity. The secure boot …

A Survey of QEMU-Based Fault Injection Tools & Techniques for Emulating Physical Faults

YB Bekele, DB Limbrick, JC Kelly - IEEE Access, 2023 - ieeexplore.ieee.org
Fault Injection (FI) is a method used to quantify the reliability and resilience of a system by
assessing the system's ability to detect, locate, and/or mitigate fault occurrences. At the …

A Security and Usability Analysis of Local Attacks Against FIDO2

TK Yadav, K Seamons - arXiv preprint arXiv:2308.02973, 2023 - arxiv.org
The FIDO2 protocol aims to strengthen or replace password authentication using public-key
cryptography. FIDO2 has primarily focused on defending against attacks from afar by remote …

Cloning Hardware Wallet without Valid Credentials Through Side-Channel Analysis of Hash Function

D Park, J Kim, HS Kim, S Hong - IEEE Access, 2024 - ieeexplore.ieee.org
Hardware wallets, specialized devices designed to securely manage users' credentials, play
a crucial role in securing cryptocurrencies, ensuring credentials remain under user control …

(Adversarial) Electromagnetic Disturbance in the Industry

A Beckers, S Guilley, P Maurine… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Faults occur naturally and are responsible for reliability concerns. Faults are also an
interesting tool for attackers to extract sensitive information from secure chips. In particular …