Access the full text.
Sign up today, get DeepDyve free for 14 days.
Neeraj Chasta (2014)
A Very High Speed, High Resolution Current Comparator DesignWorld Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, 7
Bilgiday Yuce, N. Ghalaty, Chinmay Deshpande, C. Patrick, L. Nazhandali, P. Schaumont (2016)
FAME: Fault-attack Aware Microprocessor Extensions for Hardware Fault Detection and Software Fault ResponseProceedings of the Hardware and Architectural Support for Security and Privacy 2016
Junfeng Fan, Xu Guo, E. Mulder, P. Schaumont, B. Preneel, I. Verbauwhede (2010)
State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
Ludger Hemme (2004)
A Differential Fault Attack Against Early Rounds of (Triple-)DES
U. Rührmair, Qingqing Chen, P. Lugli, Ulf Schlichtmann, M. Stutzmann, G. Csaba (2010)
Towards Electrical, Integrated Implementations of SIMPL Systems
Jeyavijayan Rajendran, G. Rose, R. Karri, M. Potkonjak (2012)
Nano-PPUF: A Memristor-Based Security Primitive2012 IEEE Computer Society Annual Symposium on VLSI
I. Mehr, D. Welland (1997)
A CMOS continuous-time Gm-C filter for PRML read channel applications at 150 Mb/s and beyondIEEE J. Solid State Circuits, 32
M. Plotkin (1960)
Binary codes with specified minimum distanceIRE Trans. Inf. Theory, 6
Y. Shiloach, U. Vishkin (1982)
An O(n² log n) Parallel MAX-FLOW AlgorithmJ. Algorithms, 3
Alessandro Barenghi, L. Breveglieri, I. Koren, D. Naccache (2012)
Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and CountermeasuresProceedings of the IEEE, 100
H. Salmani, M. Tehranipoor (2013)
Analyzing circuit vulnerability to hardware Trojan insertion at the behavioral level2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)
U. Rührmair (2009)
SIMPL Systems: On a Public Key Variant of Physical Unclonable FunctionsIACR Cryptol. ePrint Arch., 2009
2013 IEEE Symposium on Security and Privacy Practical Timing Side Channel Attacks Against Kernel Space ASLR
M. Fazeli, S. Ahmadian, S. Miremadi, H. Asadi, M. Tahoori (2011)
Soft error rate estimation of digital circuits in the presence of Multiple Event Transients (METs)2011 Design, Automation & Test in Europe
Tzu-Mu Lin, C. Mead (1984)
Signal Delay in General RC NetworksIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 3
L. Goldschlager, Ralph Shaw, J. Staples (1982)
The Maximum Flow Problem is Log Space Complete for PTheor. Comput. Sci., 21
Chien-Ning Chen, Sung-Ming Yen (2003)
Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures
U. Rührmair, Frank Sehnke, J. Sölter, G. Dror, S. Devadas, J. Schmidhuber (2010)
Modeling attacks on physical unclonable functionsIACR Cryptol. ePrint Arch., 2010
Yang Li, K. Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, J. Takahashi, K. Ohta (2010)
Fault Sensitivity Analysis
Adib Nahiyan, K. Xiao, Kun Yang, Yier Jin, Domenic Forte, M. Tehranipoor (2016)
AVFSM: A framework for identifying and mitigating vulnerabilities in FSMs2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC)
M. Potkonjak, V. Goudar (2014)
Public Physical Unclonable FunctionsProceedings of the IEEE, 102
Subhasish Mitra, Norbert Seifert, Ming Zhang, Q. Shi, Kee-sup Kim (2005)
Robust system design with built-in soft-error resilienceComputer, 38
E. Dinic (1970)
Algorithm for solution of a problem of maximal flow in a network with power estimation
M. Potkonjak, Saro Meguerdichian, A. Nahapetian, Sheng Wei (2011)
Differential public physically unclonable functions: Architecture and applications2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC)
Shubhendu Mukherjee, J. Emer, S. Reinhardt (2005)
The soft error problem: an architectural perspective11th International Symposium on High-Performance Computer Architecture
J. Suykens, J. Vandewalle (1999)
Least Squares Support Vector Machine ClassifiersNeural Processing Letters, 9
Jin Miao, Meng Li, Subhendu Roy, Bei Yu (2016)
LRR-DPUF: Learning resilient and reliable digital physical unclonable function2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
Mingze Gao, K. Lai, G. Qu (2014)
A highly flexible ring oscillator PUF2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)
E. Biham, L. Granboulan, Phong Nguyen (2005)
Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4
Jae Lee, D. Lim, B. Gassend, Ed Suh, Marten Dijk, S. Devadas (2004)
A technique to build a secret key in integrated circuits for identification and authentication applications2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525)
Meng Li, Jin Miao, Kai Zhong, D. Pan (2016)
Practical public PUF enabled by solving max-flow problem on chip2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC)
A. Yoo, E. Chow, Keith Henderson, William McLendon, B. Hendrickson, Ümit Çatalyürek (2005)
A Scalable Distributed Parallel Breadth-First Search Algorithm on BlueGene/LACM/IEEE SC 2005 Conference (SC'05)
B. Gassend, Dwaine Clarke, Marten Dijk, S. Devadas (2002)
Silicon physical random functions
Nathan Beckmann, M. Potkonjak (2009)
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
Meng Li, Ye Wang, M. Orshansky (2016)
A Monte Carlo simulation flow for SEU analysis of sequential circuits2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC)
Michael Tunstall, Debdeep Mukhopadhyay, Subidh Ali (2011)
Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault
Y. Sun, Y.S. Wang, F. Lai (2007)
Low Power High Speed Switched Current Comparator2007 14th International Conference on Mixed Design of Integrated Circuits and Systems
Mehrdad Majzoobi, F. Koushanfar (2011)
Time-Bounded Authentication of FPGAsIEEE Transactions on Information Forensics and Security, 6
A. Maiti, Vikash Gunreddy, P. Schaumont (2011)
A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable FunctionsIACR Cryptol. ePrint Arch., 2011
Ming Zhang, S. Mitra, T. Mak, N. Seifert, Nicholas Wang, Q. Shi, Kee-sup Kim, Naresh Shanbhag, Sanjay Patel (2006)
Sequential Element Design With Built-In Soft Error ResilienceIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 14
J. Woudenberg, M. Witteman, Federico Menarini (2011)
Practical Optical Fault Injection on Secure Microcontrollers2011 Workshop on Fault Diagnosis and Tolerance in Cryptography
Bilgiday Yuce, N. Ghalaty, P. Schaumont (2015)
TVVF: Estimating the vulnerability of hardware cryptosystems against timing violation attacks2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
Jonathan Kelner, L. Orecchia, Y. Lee, Aaron Sidford (2013)
An Almost-Linear-Time Algorithm for Approximate Max Flow in Undirected Graphs, and its Multicommodity Generalizations
Bilgiday Yuce, N. Ghalaty, P. Schaumont (2015)
Improving Fault Attacks on Embedded Software Using RISC Pipeline Characterization2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
A. Goldberg, R. Tarjan (1988)
A new approach to the maximum-flow problemJ. ACM, 35
Sarah Delany (2007)
k-Nearest Neighbour Classifiers
[Fault attacks can obstruct the normal system execution by injecting errors into the hardware. By radiating the critical circuit components with high energy particle strikes, voltage transients are created to make the circuit malfunction temporarily. In recent years, fault attacks have demonstrated a great capability of leaking the cryptographics keys, and nullifying the entire system security mechanisms. The chapter introduces two protection schemes, including a new security primitive, i.e., public physical unclonable function (PPUF), that has provable time gap between the execution and simulation (ESG) to derive security, and a new analysis framework to identify critical circuit components for general purpose processors and guide the design optimization.]
Published: Apr 12, 2020
Keywords: Fault attack; PPUF; ESG; Challenge-response pair; System security evaluation; Importance sampling; Statistical attack space
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.