Beckers et al., 2022 - Google Patents
(Adversarial) Electromagnetic Disturbance in the IndustryBeckers et al., 2022
View PDF- Document ID
- 7482845001344975824
- Author
- Beckers A
- Guilley S
- Maurine P
- O'Flynn C
- Picek S
- Publication year
- Publication venue
- IEEE transactions on computers
External Links
Snippet
Faults occur naturally and are responsible for reliability concerns. Faults are also an interesting tool for attackers to extract sensitive information from secure chips. In particular, non-invasive fault attacks have received a fair amount of attention. One easy way to perturb …
- 239000007924 injection 0 abstract description 56
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/3181—Functional testing
- G01R31/3185—Reconfiguring for testing, e.g. LSSD, partitioning
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/3181—Functional testing
- G01R31/3183—Generation of test inputs, e.g. test vectors, patterns or sequence
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tehranipoor et al. | A survey of hardware trojan taxonomy and detection | |
Jacob et al. | Hardware Trojans: current challenges and approaches | |
Karri et al. | Trustworthy hardware: Identifying and classifying hardware trojans | |
Wang et al. | IIPS: Infrastructure IP for secure SoC design | |
Wang et al. | Sofi: Security property-driven vulnerability assessments of ics against fault-injection attacks | |
Tehranipoor et al. | A survey of hardware trojan taxonomy and detection | |
Cui et al. | A new PUF based lock and key solution for secure in-field testing of cryptographic chips | |
CN108986857A (en) | Integrated circuit and its method with anti-tampering protection | |
US20220180003A1 (en) | Security property-driven vulnerability assessments of ics against fault-injection attacks | |
Ahmed et al. | Quantifiable assurance: from IPs to platforms | |
Jain et al. | Atpg-guided fault injection attacks on logic locking | |
Vosatka | Introduction to hardware trojans | |
Rahman et al. | Dynamically obfuscated scan chain to resist oracle-guided attacks on logic locked design | |
Hoque et al. | Trust issues in microelectronics: The concerns and the countermeasures | |
Shuvo et al. | A comprehensive survey on non-invasive fault injection attacks | |
Deshpande et al. | Employing dual-complementary flip-flops to detect EMFI attacks | |
Wang et al. | DOST: Dynamically obfuscated wrapper for split test against IC piracy | |
O'Flynn | PicoEMP: A Low-Cost EMFI Platform Compared to BBI and Voltage Fault Injection using TDC & External VCC Measurements | |
US10909284B1 (en) | Method and system for selection of location for placement of trojans, triggers and instruments within integrated circuits and electronic systems using weighted controllability and observability analysis | |
Beckers et al. | (Adversarial) Electromagnetic Disturbance in the Industry | |
Forte et al. | Supply-chain security for cyberinfrastructure [Guest editors' introduction] | |
El Amraoui et al. | Harmonic response of ring oscillators under single electromagnetic pulsed fault injection | |
Rajendran et al. | Sok: Physical and logic testing techniques for hardware trojan detection | |
Muttaki et al. | FTC: A Universal Framework for Fault-Injection Attack Detection and Prevention | |
Danesh et al. | Efficient hardware Trojan detection with differential cascade voltage switch logic |