2019
DOI: 10.1049/iet-cdt.2018.5186
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating information leakage during critical communication using S*FSM

Abstract: Security-centric components and systems, such as System-on-Chip early-boot communication protocols and ultraspecific lightweight devices, require a departure from minimalist design constructs. The need for built-in protection mechanisms, at all levels of design, is paramount to providing cost-effective, efficient, secure systems. In this work, Securely derived Finite State Machines (S*FSM) and power-aware S*FSM are proposed and studied. Overall results show that to provide an S*FSM, the typical FSM requires a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 37 publications
0
4
0
Order By: Relevance
“…Hence, an error e in the binary Galois field is defined as e ¼ e z 1 ; 7,32]. Thus, the error masking equation for C is given in Equation (3).…”
Section: Fsm Security Through State Assignmentmentioning
confidence: 99%
See 3 more Smart Citations
“…Hence, an error e in the binary Galois field is defined as e ¼ e z 1 ; 7,32]. Thus, the error masking equation for C is given in Equation (3).…”
Section: Fsm Security Through State Assignmentmentioning
confidence: 99%
“…Therefore, the error masking set XðeÞ for C is defined as the set of z 1 0 s, which satisfies Equation (3). It is defined by Equation (4).…”
Section: Fsm Security Through State Assignmentmentioning
confidence: 99%
See 2 more Smart Citations