Electrical-level attacks on CPUs, FPGAs, and GPUs: Survey and implications in the heterogeneous era

DG Mahmoud, V Lenders, M Stojilović - ACM Computing Surveys (CSUR …, 2022 - dl.acm.org
Given the need for efficient high-performance computing, computer architectures combining
central processing units (CPUs), graphics processing units (GPUs), and field-programmable …

A comprehensive survey on non-invasive fault injection attacks

AM Shuvo, T Zhang, F Farahmandi… - Cryptology ePrint …, 2023 - eprint.iacr.org
Non-invasive fault injection attacks have emerged as significant threats to a spectrum of
microelectronic systems ranging from commodity devices to high-end customized …

[HTML][HTML] Mathematical model and FPGA realization of a multi-stable chaotic dynamical system with a closed butterfly-like curve of equilibrium points

A Sambas, S Vaidyanathan, T Bonny, S Zhang… - Applied Sciences, 2021 - mdpi.com
This paper starts with a review of three-dimensional chaotic dynamical systems equipped
with special curves of balance points. We also propose the mathematical model of a new …

Secure image encryption scheme using 4D-Hyperchaotic systems based reconfigurable pseudo-random number generator and S-Box

MD Gupta, RK Chauhan - Integration, 2021 - Elsevier
This paper introduces the design of a hardware efficient reconfigurable pseudorandom
number generator (PRNG) using two different feedback controllers based four-dimensional …

Chaotic or hyper-chaotic oscillator? Numerical solution, circuit design, MATLAB HDL-coder implementation, VHDL code, security analysis, and FPGA realization

T Bonny - Circuits, Systems, and Signal Processing, 2021 - Springer
Hyper-chaotic systems can exhibit a higher level of complexity in comparison with the
chaotic systems. However, they require more resources when they are realized on a …

Voice encryption using a unified hyper-chaotic system

T Bonny, WA Nassan, A Baba - Multimedia Tools and Applications, 2023 - Springer
A Chaos-based cryptosystem is a vital method to enhance information protection in
communication systems. The previous works have addressed this topic either by using …

Highly-secured chaos-based communication system using cascaded masking technique and adaptive synchronization

T Bonny, WA Nassan, S Vaidyanathan… - Multimedia Tools and …, 2023 - Springer
Over the past years, many chaos-based secure communication system algorithms have
been published for the encryption of different types of data. The problem with these …

An lstm model-based prediction of chaotic system: Analyzing the impact of training dataset precision on the performance

W Al Nassan, T Bonny, K Obaideen… - … on Electrical and …, 2022 - ieeexplore.ieee.org
The chaotic systems are crucial due to their spread applications in different fields. The
modeling and prediction of chaotic time series improved significantly with the recent …

FPGA to study the behavior of a maneuvering UGV using sliding innovation filter

M AlShabi, T Bonny… - Signal Processing, Sensor …, 2023 - spiedigitallibrary.org
Field programmable gate arrays (FPGAs) are increasingly popular due to their
customizability, which enables them to be tailored to specific applications, resulting in …

Secure physical design

S Dey, J Park, N Pundir, D Saha, AM Shuvo… - Cryptology ePrint …, 2022 - eprint.iacr.org
An integrated circuit is subject to a number of attacks including information leakage, side-
channel attacks, fault-injection, malicious change, reverse engineering, and piracy. Majority …