Beckers et al., 2022 - Google Patents

(Adversarial) Electromagnetic Disturbance in the Industry

Beckers et al., 2022

View PDF
Document ID
7482845001344975824
Author
Beckers A
Guilley S
Maurine P
O'Flynn C
Picek S
Publication year
Publication venue
IEEE transactions on computers

External Links

Snippet

Faults occur naturally and are responsible for reliability concerns. Faults are also an interesting tool for attackers to extract sensitive information from secure chips. In particular, non-invasive fault attacks have received a fair amount of attention. One easy way to perturb …
Continue reading at telecom-paris.hal.science (PDF) (other versions)

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/3181Functional testing
    • G01R31/3185Reconfiguring for testing, e.g. LSSD, partitioning
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/3181Functional testing
    • G01R31/3183Generation of test inputs, e.g. test vectors, patterns or sequence
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled

Similar Documents

Publication Publication Date Title
Tehranipoor et al. A survey of hardware trojan taxonomy and detection
Jacob et al. Hardware Trojans: current challenges and approaches
Karri et al. Trustworthy hardware: Identifying and classifying hardware trojans
Wang et al. IIPS: Infrastructure IP for secure SoC design
Wang et al. Sofi: Security property-driven vulnerability assessments of ics against fault-injection attacks
Tehranipoor et al. A survey of hardware trojan taxonomy and detection
Cui et al. A new PUF based lock and key solution for secure in-field testing of cryptographic chips
CN108986857A (en) Integrated circuit and its method with anti-tampering protection
US20220180003A1 (en) Security property-driven vulnerability assessments of ics against fault-injection attacks
Ahmed et al. Quantifiable assurance: from IPs to platforms
Jain et al. Atpg-guided fault injection attacks on logic locking
Vosatka Introduction to hardware trojans
Rahman et al. Dynamically obfuscated scan chain to resist oracle-guided attacks on logic locked design
Hoque et al. Trust issues in microelectronics: The concerns and the countermeasures
Shuvo et al. A comprehensive survey on non-invasive fault injection attacks
Deshpande et al. Employing dual-complementary flip-flops to detect EMFI attacks
Wang et al. DOST: Dynamically obfuscated wrapper for split test against IC piracy
O'Flynn PicoEMP: A Low-Cost EMFI Platform Compared to BBI and Voltage Fault Injection using TDC & External VCC Measurements
US10909284B1 (en) Method and system for selection of location for placement of trojans, triggers and instruments within integrated circuits and electronic systems using weighted controllability and observability analysis
Beckers et al. (Adversarial) Electromagnetic Disturbance in the Industry
Forte et al. Supply-chain security for cyberinfrastructure [Guest editors' introduction]
El Amraoui et al. Harmonic response of ring oscillators under single electromagnetic pulsed fault injection
Rajendran et al. Sok: Physical and logic testing techniques for hardware trojan detection
Muttaki et al. FTC: A Universal Framework for Fault-Injection Attack Detection and Prevention
Danesh et al. Efficient hardware Trojan detection with differential cascade voltage switch logic