Voltjockey: Breaching trustzone by software-controlled voltage manipulation over multi-core frequencies

P Qiu, D Wang, Y Lyu, G Qu - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
ARM TrustZone builds a trusted execution environment based on the concept of hardware
separation. It has been quite successful in defending against various software attacks and …

Attacks on cryptosystems implemented via VLSI: A review

MM Sravani, SA Durai - Journal of Information Security and Applications, 2021 - Elsevier
Serious threats to the VLSI crypto devices are posed by the Side Channel Attack (SCA) that
utilizes the devices' SCI (Side Channel Information) to break the entire cryptographic …

An efficient collision power attack on AES encryption in edge computing

Y Niu, J Zhang, A Wang, C Chen - IEEE Access, 2019 - ieeexplore.ieee.org
Edge computing has become a promising paradigm for the context-aware and delay-
sensitive IoT data analytics. For the sake of security, some cryptographic algorithms such as …

Voltjockey: A new dynamic voltage scaling-based fault injection attack on intel sgx

P Qiu, D Wang, Y Lyu, R Tian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Intel software guard extensions (SGX) increase the security of applications by enabling them
to be performed in a highly trusted space (called enclave). Most state-of-the-art attacks on …

A machine learning attack resistant dual-mode PUF

Q Wang, M Gao, G Qu - Proceedings of the 2018 on Great Lakes …, 2018 - dl.acm.org
Silicon Physical Unclonable Function (PUF) is arguably the most promising hardware
security primitive. In particular, PUFs that are capable of generating a large amount of …

Lightweight and Attack-resilient PUF for Internet of Things

A Rajan, S Sankaran - 2020 IEEE International Symposium on …, 2020 - ieeexplore.ieee.org
IoT security is of paramount concern due to poorly configured devices that can often serve
as entry points for cyber attacks. Developing Physically Unclonable Functions (PUFs) and …

Adaptive chosen-plaintext collision attack on masked AES in edge computing

Y Ding, Y Shi, A Wang, X Zheng, Z Wang… - IEEE Access, 2019 - ieeexplore.ieee.org
Edge computing handles delay-sensitive data and provides real-time feedback, while it
brings data security issues to edge devices (such as IoT devices and edge servers). Side …

New approaches of side-channel attacks based on chip testing methods

S Meschkov, DRE Gnad, J Krautter… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The state-of-the-art test infrastructure security is based on the assumption of preventing
access to the sensitive information and the (publicly) accessible outputs or test infrastructure …

Cryptanalysis of a chaotic block cryptographic system against template attacks

Y Luo, S Zhang, J Liu, L Cao - International Journal of Bifurcation …, 2020 - World Scientific
The security of chaotic cryptographic system can be theoretically evaluated by using
conventional statistical tests and numerical simulations, such as the character frequency …

Machine learning-based similarity attacks for chaos-based cryptosystems

J Liu, S Zhang, Y Luo, L Cao - IEEE Transactions on Emerging …, 2020 - ieeexplore.ieee.org
When the chaotic block cryptographic algorithms are performed on hardware devices, the
leakages of power consumption etc. are crucial information which can be used to analyse …