Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop 2019
DOI: 10.1145/3338508.3359577
|View full text |Cite
|
Sign up to set email alerts
|

Peak Clock

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Frequency. Fault injection is possible by changing the frequency of the processor's clock, 8 ○ in to overclock using high-frequency signals [195]. Since the PLL generates the internal clock signal by modifying the input clock signal (multiplying or dividing the frequency by a factor), changing the frequency of the external clock for enough clock cycles will result in the PLL also adjusting its output clock signal.…”
Section: Hardware-based Faultmentioning
confidence: 99%
“…Frequency. Fault injection is possible by changing the frequency of the processor's clock, 8 ○ in to overclock using high-frequency signals [195]. Since the PLL generates the internal clock signal by modifying the input clock signal (multiplying or dividing the frequency by a factor), changing the frequency of the external clock for enough clock cycles will result in the PLL also adjusting its output clock signal.…”
Section: Hardware-based Faultmentioning
confidence: 99%
“…There are various practical techniques for generating a faulty clock signal [11,17,19,27,29,[37][38][39][40][41]48,49]. All of the proposed methods call for a high-frequency clock signal, the so-called 'Nominal Clock' on the clock fault generator side.…”
Section: A Review Of Previously Proposed Clock Glitch Generatorsmentioning
confidence: 99%
“…All fault injection methods temporarily disturb the physical runtime environment of the Device under Test (DuT) to cause specific misbehavior. Common FI attacks are, e.g., conducted by disturbing the supply voltage [3], generating malicious clock signals [49], rapidly changing the electromagnetic environment [28], or inducing a light pulse at the decapsulated Integrated Circuits (ICs) [59]. The possible consequences from injecting a certain type of fault are described by a FI method's Fault Model.…”
Section: Introductionmentioning
confidence: 99%