JTAG Combined Attack - Another Approach for Fault Injection
暂无分享,去创建一个
[1] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[2] L. Futcher,et al. IFIP – The International Federation for Information Processing , 2013 .
[3] Israel Koren,et al. Workshop on fault diagnosis and tolerance in cryptography , 2004, International Conference on Dependable Systems and Networks, 2004.
[4] David Naccache,et al. The Sorcerer's Apprentice Guide to Fault Attacks , 2006, Proceedings of the IEEE.
[5] Ahmad-Reza Sadeghi,et al. Privilege Escalation Attacks on Android , 2010, ISC.
[6] Guillaume Barbu,et al. Attacks on Java Card 3.0 Combining Fault and Logical Attacks , 2010, CARDIS.
[7] Eric Vétillard,et al. Combined Attacks and Countermeasures , 2010, CARDIS.
[8] Ramesh Karri,et al. Attacks and Defenses for JTAG , 2010, IEEE Design & Test of Computers.
[9] Sergei Skorobogatov,et al. Breakthrough Silicon Scanning Discovers Backdoor in Military Chip , 2012, CHES.
[10] Collin Mulliner,et al. Android Hacker's Handbook , 2014 .
[11] Michael Tunstall,et al. SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip , 2015, CHES.
[12] Philippe Maurine,et al. EM Injection: Fault Model and Locality , 2015, 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).