2017 IEEE 2nd International Verification and Security Workshop (IVSW) 2017
DOI: 10.1109/ivsw.2017.8031538
|View full text |Cite
|
Sign up to set email alerts
|

Robust secure design by increasing the resilience of Attack Protection Blocks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Spatial redundancy-based countermeasures are a class of countermeasures which use the duplication/multiplication of the hardware of the CC to ensure the accuracy of the output through majority voting, and temporal redundancy based countermeasures verify the output through repetition of (part of) the cryptographic algorithm in time. Even though these countermeasures are advantageous in countering fault injection attacks, spatial, temporal, and information redundancies will lead to increased power dissipation of CC, reduced throughput, and increased area of the CC [10,11,16,25]. Alternatively, analog countermeasures, such as voltage, temperature, and frequency sensors, are used to detect malicious fault injection activities and to protect a CC by ceasing the operations if such an activity is detected [11,16,26].…”
mentioning
confidence: 99%
“…Spatial redundancy-based countermeasures are a class of countermeasures which use the duplication/multiplication of the hardware of the CC to ensure the accuracy of the output through majority voting, and temporal redundancy based countermeasures verify the output through repetition of (part of) the cryptographic algorithm in time. Even though these countermeasures are advantageous in countering fault injection attacks, spatial, temporal, and information redundancies will lead to increased power dissipation of CC, reduced throughput, and increased area of the CC [10,11,16,25]. Alternatively, analog countermeasures, such as voltage, temperature, and frequency sensors, are used to detect malicious fault injection activities and to protect a CC by ceasing the operations if such an activity is detected [11,16,26].…”
mentioning
confidence: 99%