Zobrazeno 1 - 3
of 3
pro vyhledávání: '"Niek Timmers"'
Publikováno v:
Smart Card Research and Advanced Applications-16th International Conference, CARDIS 2017,Revised Selected Papers, 160-179
STARTPAGE=160;ENDPAGE=179;TITLE=Smart Card Research and Advanced Applications-16th International Conference, CARDIS 2017,Revised Selected Papers
Cojocar, L, Papagiannopoulos, K & Timmers, N 2018, Instruction duplication : Leaky and not too fault-tolerant! in Smart Card Research and Advanced Applications-16th International Conference, CARDIS 2017,Revised Selected Papers . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10728 LNCS, Springer/Verlag, pp. 160-179, 16th International Conference on Smart Card Research and Advanced Applications, CARDIS 2017, Lugano, Switzerland, 13/11/17 . https://doi.org/10.1007/978-3-319-75208-2_10
Smart Card Research and Advanced Applications ISBN: 9783319752075
CARDIS
STARTPAGE=160;ENDPAGE=179;TITLE=Smart Card Research and Advanced Applications-16th International Conference, CARDIS 2017,Revised Selected Papers
Cojocar, L, Papagiannopoulos, K & Timmers, N 2018, Instruction duplication : Leaky and not too fault-tolerant! in Smart Card Research and Advanced Applications-16th International Conference, CARDIS 2017,Revised Selected Papers . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10728 LNCS, Springer/Verlag, pp. 160-179, 16th International Conference on Smart Card Research and Advanced Applications, CARDIS 2017, Lugano, Switzerland, 13/11/17 . https://doi.org/10.1007/978-3-319-75208-2_10
Smart Card Research and Advanced Applications ISBN: 9783319752075
CARDIS
Fault injection attacks alter the intended behavior of micro-controllers, compromising their security. These attacks can be mitigated using software countermeasures. A widely-used software-based solution to deflect fault attacks is instruction duplic
Autor:
Niek Timmers, Cristofaro Mune
Publikováno v:
FDTC
Today's standard embedded device technology is not robust against Fault Injection (FI) attacks such as Voltage Fault Injection (V-FI). FI attacks can be used to alter the intended behavior of software and hardware of embedded devices. Most FI researc
Publikováno v:
FDTC
Fault injection attacks are a powerful technique to influence the intended behavior of embedded systems. They can be used to exploit or bypass robust security features found in secure embedded systems. Examples of such attacks include differential fa