Zobrazeno 1 - 10
of 39
pro vyhledávání: '"software countermeasures"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 108-129 (2017)
To protect against side-channel attacks, many countermeasures have been proposed. A novel customized encoding countermeasure was published in FSE 2016. Customized encoding exploits knowledge of the profiled leakage of the device to construct an optim
Externí odkaz:
https://doaj.org/article/0e49b42a7b504af985e4751a5d96c4cc
Publikováno v:
Journal of Hardware and Systems Security. 2:345-352
Security-sensitive integrated circuits (ICs) are equipped with various hardware and software countermeasures which make them more secure. However, the chip backside is still exposed, and a proper countermeasure which is able to protect the ICs agains
Publikováno v:
Microelectronics Reliability
Microelectronics Reliability, Elsevier, 2021
Microelectronics Reliability, Elsevier, 2021
International audience; Microcontrollers storing valuable data or using security functions are vulnerable to fault injection attacks. Among the various types of faults, instruction skips induced at runtime proved to be effective against identificatio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::aa9d5e593b4da5ce79d824623a465d3d
https://hal.archives-ouvertes.fr/hal-03360628
https://hal.archives-ouvertes.fr/hal-03360628
Publikováno v:
Sécurité des Interfaces Logiciel/Matériel
Sécurité des Interfaces Logiciel/Matériel, Sep 2020, Genoa (virtual), Italy. ⟨10.1109/EuroSPW51379.2020.00100⟩
EuroS&P Workshops
Sécurité des Interfaces Logiciel/Matériel, Sep 2020, Genoa (virtual), Italy. ⟨10.1109/EuroSPW51379.2020.00100⟩
EuroS&P Workshops
International audience; Many fault injection techniques have been proposed in the recent years to attack computing systems, as well as the corresponding countermeasures. Most of published attacks are limited to one or a few faults. We provide a theor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::41b05cadd434472903f18198006c4199
https://hal.inria.fr/hal-02912301/file/silm_workshop_2020.pdf
https://hal.inria.fr/hal-02912301/file/silm_workshop_2020.pdf
Autor:
Vincent Beroulle, Christophe Deleuze, Florian Pebay-Peyroula, Athanasios Papadimitriou, Johan Laurent
Publikováno v:
Microprocessors and Microsystems: Embedded Hardware Design
Microprocessors and Microsystems: Embedded Hardware Design, 2019, 71, pp.102862. ⟨10.1016/j.micpro.2019.102862⟩
Microprocessors and Microsystems: Embedded Hardware Design (MICPRO)
Microprocessors and Microsystems: Embedded Hardware Design (MICPRO), Elsevier, 2019, 71, pp.102862. ⟨10.1016/j.micpro.2019.102862⟩
Microprocessors and Microsystems: Embedded Hardware Design, 2019, 71, pp.102862. ⟨10.1016/j.micpro.2019.102862⟩
Microprocessors and Microsystems: Embedded Hardware Design (MICPRO)
Microprocessors and Microsystems: Embedded Hardware Design (MICPRO), Elsevier, 2019, 71, pp.102862. ⟨10.1016/j.micpro.2019.102862⟩
Conference: ASHA Convention. Boston, MA. 2018.; International audience; Fault injection is a powerful technique for attacking digital systems. Software developers have to take into account hardware fault effects when system security is a concern. Sof
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c81c20fb2e964c4974f218ca29076393
https://hal.univ-grenoble-alpes.fr/hal-02426107/file/S0141933118304745.pdf
https://hal.univ-grenoble-alpes.fr/hal-02426107/file/S0141933118304745.pdf
Publikováno v:
Smart Card Research and Advanced Applications-16th International Conference, CARDIS 2017,Revised Selected Papers, 160-179
STARTPAGE=160;ENDPAGE=179;TITLE=Smart Card Research and Advanced Applications-16th International Conference, CARDIS 2017,Revised Selected Papers
Cojocar, L, Papagiannopoulos, K & Timmers, N 2018, Instruction duplication : Leaky and not too fault-tolerant! in Smart Card Research and Advanced Applications-16th International Conference, CARDIS 2017,Revised Selected Papers . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10728 LNCS, Springer/Verlag, pp. 160-179, 16th International Conference on Smart Card Research and Advanced Applications, CARDIS 2017, Lugano, Switzerland, 13/11/17 . https://doi.org/10.1007/978-3-319-75208-2_10
Smart Card Research and Advanced Applications ISBN: 9783319752075
CARDIS
STARTPAGE=160;ENDPAGE=179;TITLE=Smart Card Research and Advanced Applications-16th International Conference, CARDIS 2017,Revised Selected Papers
Cojocar, L, Papagiannopoulos, K & Timmers, N 2018, Instruction duplication : Leaky and not too fault-tolerant! in Smart Card Research and Advanced Applications-16th International Conference, CARDIS 2017,Revised Selected Papers . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10728 LNCS, Springer/Verlag, pp. 160-179, 16th International Conference on Smart Card Research and Advanced Applications, CARDIS 2017, Lugano, Switzerland, 13/11/17 . https://doi.org/10.1007/978-3-319-75208-2_10
Smart Card Research and Advanced Applications ISBN: 9783319752075
CARDIS
Fault injection attacks alter the intended behavior of micro-controllers, compromising their security. These attacks can be mitigated using software countermeasures. A widely-used software-based solution to deflect fault attacks is instruction duplic
Publikováno v:
Journal of Cryptographic Engineering. 7:311-320
Recently, several software encoding countermeasures were proposed, utilizing the side-channel hiding concept for software implementations. While these schemes aim to protect the underlying code against various leakage models, they can also be utilize
Autor:
Kiaei, Pantea
The cryptographic algorithms are designed to be mathematically secure; however, side-channel analysis attacks go beyond mathematics by taking measurements of the device’s electrical activity to reveal the secret data of a cipher. These attacks also
Externí odkaz:
http://hdl.handle.net/10919/93537
Autor:
Abderrahmane Seriai, Damien Couroussé, Thierno Barry, Karine Heydemann, Nicolas Belleville, Bruno Robisson, Henri-Pierre Charles
Publikováno v:
Cyber-Physical Systems Security
Çetin Kaya Koç. Cyber-Physical Systems Security, Springer International Publishing, pp.135-155, 2018, 978-3-319-98934-1. ⟨10.1007/978-3-319-98935-8_7⟩
Cyber-Physical Systems Security ISBN: 9783319989341
Çetin Kaya Koç. Cyber-Physical Systems Security, Springer International Publishing, pp.135-155, 2018, 978-3-319-98934-1. ⟨10.1007/978-3-319-98935-8_7⟩
Cyber-Physical Systems Security ISBN: 9783319989341
International audience; While the number of embedded systems is continuously increasing, securing software against physical attacks is costly and error-prone. Several works proposed solutions that automatically insert protections against these attack
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a4a509a27c888d40b8c98091b6ab5fd3
https://hal.sorbonne-universite.fr/hal-01951305/file/CPSEd.pdf
https://hal.sorbonne-universite.fr/hal-01951305/file/CPSEd.pdf
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 108-129 (2017)
IACR Transactions on Symmetric Cryptology; Volume 2017, Issue 3; 108-129
IACR Transactions on Symmetric Cryptology; Volume 2017, Issue 3; 108-129
To protect against side-channel attacks, many countermeasures have been proposed. A novel customized encoding countermeasure was published in FSE 2016. Customized encoding exploits knowledge of the profiled leakage of the device to construct an optim
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::de13cb71d9478c9a194f877a43b455f3