2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID) 2018
DOI: 10.1109/vlsid.2018.40
|View full text |Cite
|
Sign up to set email alerts
|

An Energy-Efficient Trusted FSM Design Technique to Thwart Fault Injection and Trojan Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Without knowing the state registers of the netlist, brute force checking of manufactured chips is time consuming, making it hard to detect the malicious circuit of the afflicted core. Some fault injection attacks [6], [7] also target FSM state registers to crack the cipher key used to encrypt the sensitive information. Such attacks usually assume knowledge about the FSM.…”
Section: Introductionmentioning
confidence: 99%
“…Without knowing the state registers of the netlist, brute force checking of manufactured chips is time consuming, making it hard to detect the malicious circuit of the afflicted core. Some fault injection attacks [6], [7] also target FSM state registers to crack the cipher key used to encrypt the sensitive information. Such attacks usually assume knowledge about the FSM.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the intuitive description of Mealy [1] and Moore [2] machines, FSMs are widely adopted in various operational models [3][4][5]. In particular, modern digital circuits generally employ FSMs to build control paths that control the data path efficiently [6,7]. Furthermore, FSMs should be carefully dealt with because even a minute variation in them could completely alter the overall operation of the digital circuits [6,7].…”
Section: Introductionmentioning
confidence: 99%
“…It is also noted that some fault injection [8,9] attacks have been proposed to inject faults into the FSM to crack the cipher key that is used to encrypt sensitive information. The success of such attack relies on the fact that the FSM design structure is not kept secret.…”
Section: Introductionmentioning
confidence: 99%