[HTML][HTML] A systematic review of fault injection attacks on IOT systems

A Gangolli, QH Mahmoud, A Azim - Electronics, 2022 - mdpi.com
The field of the Internet of Things (IoT) is growing at a breakneck pace and its applications
are becoming increasingly sophisticated with time. Fault injection attacks on IoT systems are …

[HTML][HTML] Hardware countermeasures benchmarking against fault attacks

FE Potestad-Ordóñez, E Tena-Sánchez… - Applied Sciences, 2022 - mdpi.com
The development of differential fault analysis (DFA) techniques and mechanisms to inject
faults into cryptographic circuits brings with it the need to use protection mechanisms that …

Design and evaluation of countermeasures against fault injection attacks and power side-channel leakage exploration for AES block cipher

FE Potestad-Ordonez, E Tena-Sánchez… - IEEE …, 2022 - ieeexplore.ieee.org
Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main
methods for exploiting the vulnerabilities of physical implementations of block ciphers …

[HTML][HTML] An exploratory study of cognitive sciences applied to cybersecurity

RO Andrade, W Fuertes, M Cazares, I Ortiz-Garcés… - Electronics, 2022 - mdpi.com
Cognitive security is the interception between cognitive science and artificial intelligence
techniques used to protect institutions against cyberattacks. However, this field has not been …

Protecting FPGA-Based Cryptohardware Implementations from Fault Attacks Using ADCs

FE Potestad-Ordóñez, A Casado-Galán… - Sensors, 2024 - mdpi.com
The majority of data exchanged between connected devices are confidential and must be
protected against unauthorized access. To ensure data protection, so-called cryptographic …

An in-depth vulnerability analysis of risc-v micro-architecture against fault injection attack

Z Kazemi, A Norollah, A Kchaou… - … on Defect and Fault …, 2021 - ieeexplore.ieee.org
Fault injection attacks have been intensively used to corrupt the normal function of
embedded systems. This threat can be evaluated either by experimental or simulation …

Trivium stream cipher countermeasures against fault injection attacks and DFA

FE Potestad-Ordóñez, E Tena-Sánchez… - IEEE …, 2021 - ieeexplore.ieee.org
Attacks on cryptocircuits are becoming increasingly sophisticated, requiring designers to
include more and more countermeasures in the design to protect it against malicious …

Fault Injection Attacks on Embedded Applications: Characterization and Evaluation

Z Kazemi - 2022 - theses.hal.science
The security assessment of IoT devices against potential software and hardware-based
threats is now a necessary task for embedded software developers. Having physical access …

Experimental evaluation of RISC-V micro-architecture against fault injection attack

M Esmaeilian, H Beitollahi - Microprocessors and Microsystems, 2024 - Elsevier
Today, the use of embedded processors is increasing dramatically and they are used in all
aspects from our daily life to security applications. Physical access to hardware has made …

[HTML][HTML] Vulnerability assessment of ubiquitous cities using the analytic hierarchy process

MAUR Tariq, CY Wai, N Muttil - Future Internet, 2020 - mdpi.com
Urbanization is a challenge faced by most countries worldwide and leads to several
problems. Due to rapid communication capabilities, conforming the megacities into …