2014 22nd International Conference on Very Large Scale Integration (VLSI-SoC) 2014
DOI: 10.1109/vlsi-soc.2014.7004184
|View full text |Cite
|
Sign up to set email alerts
|

Laser-induced fault effects in security-dedicated circuits

Abstract: HAL is a multidisciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L'archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d'enseignement et de recherche français ou étrangers, des labora… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Such attacks are aimed at disrupting the normal memory operation through preventing changes of the memory contents. Van Woudenberg et al investigated optical fault injection on secure microcontrollers and concluded that the presence of countermeasures makes the attack more difficult but still possible [8,9]. Note, while being very powerful, optical fault injection attacks are usually considered very complex due to the high costs of equipment and the preparation of the sample.…”
Section: Related Workmentioning
confidence: 99%
“…Such attacks are aimed at disrupting the normal memory operation through preventing changes of the memory contents. Van Woudenberg et al investigated optical fault injection on secure microcontrollers and concluded that the presence of countermeasures makes the attack more difficult but still possible [8,9]. Note, while being very powerful, optical fault injection attacks are usually considered very complex due to the high costs of equipment and the preparation of the sample.…”
Section: Related Workmentioning
confidence: 99%
“…The only difference in stealing physical goods and stealing information is that theft of data still leaves the owner in possession of that data. Passive information attack is thus more dangerous than stealing of goods, as information theft may go unnoticed by the owner [12]. Active Attacks-In this attack attacker does some process on information so that he can change some information In For example,…”
Section: Bitsmentioning
confidence: 99%
“…We will focus here on fault-based attacks aiming at retrieving some confidential information such as a private cryptographic key stored in the circuit. One of the most efficient techniques to induce faults in a circuit is to use a laser [1].…”
Section: Introductionmentioning
confidence: 99%