2016
DOI: 10.1587/elex.13.20160872
|View full text |Cite
|
Sign up to set email alerts
|

Against fault attacks based on random infection mechanism

Abstract: Fault attack is a very effective way to crack the key for cipher chip. Among existing fault attack countermeasures, the infection countermeasures are very effective means, but, most existing infection countermeasures are based on the single fault assumption, and the accuracy of fault injections has significantly improved in the late years, it has become possible to implementation of double fault attacks in specific circuit regions, and it is, therefore, flawed in the resistance to double fault attacks. Aim at … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 12 publications
(23 reference statements)
0
2
0
Order By: Relevance
“…In [22], a supervised learning approach against cyber attacks on demand side of power systems is proposed to achieve attack detection with the aid of the characteristics of the demand side attacks (DSA). Random infection mechanism is proposed to mitigate fault attacks using encryption/decryption circuit [23]. performance of side channel attack sensor is analyzed to improve the system security [24].…”
Section: Related Workmentioning
confidence: 99%
“…In [22], a supervised learning approach against cyber attacks on demand side of power systems is proposed to achieve attack detection with the aid of the characteristics of the demand side attacks (DSA). Random infection mechanism is proposed to mitigate fault attacks using encryption/decryption circuit [23]. performance of side channel attack sensor is analyzed to improve the system security [24].…”
Section: Related Workmentioning
confidence: 99%
“…This is because the detection locations are associated with the data being processed [21]. Another type of approach is the use of fault infection [22][23][24]. Since the infection strategy does not need to utilize the detection locations, it effectively avoids the potential threat of being attacked due to the presence of detection locations.…”
Section: Introductionmentioning
confidence: 99%
“…2023, 13, 12530 2 of 11 mechanism in [25] was deficient due to the same unknown mask being used in the infection process and improved on [25]. In 2019, by utilizing the encryption/decryption circuit, [22] proposed a countermeasure against fault attack called random infection mechanism.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…An attacker who possesses a set of oscilloscope and personal computer can successfully derive the key information. Fault attacks [2,3] are attacks that exploit faulty cipher-text from a cryptographic module to guess the secret key. The fault operation is intentionally caused by injecting clock glitch, supplying abnormal voltage and irradiating a laser to the module.…”
Section: Introductionmentioning
confidence: 99%