2013 Euromicro Conference on Digital System Design 2013
DOI: 10.1109/dsd.2013.43
|View full text |Cite
|
Sign up to set email alerts
|

Emulation-Based Fault Effect Analysis for Resource Constrained, Secure, and Dependable Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…Therefore, it is imperative for RTESs to protect critical information and against the potential attacks. At present, most researchers focus on designing the security-aware techniques for handling attacks such as SCAs, [1][2][3][4][5] LMFAs, 6 SLCAs and CIAs, 7,8 which are brie°y introduced in Table 2. The details of these attacks and their corresponding solutions are given in the following sections.…”
Section: Speci¯c Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, it is imperative for RTESs to protect critical information and against the potential attacks. At present, most researchers focus on designing the security-aware techniques for handling attacks such as SCAs, [1][2][3][4][5] LMFAs, 6 SLCAs and CIAs, 7,8 which are brie°y introduced in Table 2. The details of these attacks and their corresponding solutions are given in the following sections.…”
Section: Speci¯c Attacksmentioning
confidence: 99%
“…Druml et al 6 proposed a new analysis approach to assess system behaviors at the design stage. They adopted an emulation-based method to evaluate faults, which could in°uence system behaviors such as information leakage, power supply and power consumption that provide accurate cyclic analysis in real time.…”
Section: Lmfasmentioning
confidence: 99%
See 1 more Smart Citation
“…In this figure, a smart card executes a pure software encryption, which results in its supply voltage to drop hazardously below a threshold of 1 V. Given these vulnerabilities and constraints, flexible pure software solutions for com- The smart card's operational stability will be disturbed if these emergencies are not handled properly. Obtained with changes from [3]. plex cryptographic operations are very difficult to implement without violating critical power or timing constraints.…”
Section: Introductionmentioning
confidence: 99%