A Fast Characterization Method for Semi-invasive Fault Injection Attacks
暂无分享,去创建一个
Stjepan Picek | Noemie Beringuier-Boher | Lichao Wu | Gerard Ribera | S. Picek | Lichao Wu | Noemie Beringuier-Boher | Gerard Ribera
[1] A. Johnston. Charge generation and collection in p-n junctions excited with pulsed infrared lasers , 1993 .
[2] Jean-Max Dutertre,et al. Body Biasing Injection Attacks in Practice , 2016, CS2@HiPEAC.
[3] Alan Hanjalic,et al. Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis , 2019, IACR Cryptol. ePrint Arch..
[4] Georg Sigl,et al. Semi-invasive EM attack on FPGA RO PUFs and countermeasures , 2011 .
[5] Patrick van der Smagt,et al. Introduction to neural networks , 1995, The Lancet.
[6] Sergei Skorobogatov,et al. Semi-invasive attacks: a new approach to hardware security analysis , 2005 .
[7] Ilia Polian,et al. Precise fault-injections using voltage and temperature manipulation for differential cryptanalysis , 2014, 2014 IEEE 20th International On-Line Testing Symposium (IOLTS).
[8] Giorgio Di Natale,et al. Laser-induced fault effects in security-dedicated circuits , 2014, 2014 22nd International Conference on Very Large Scale Integration (VLSI-SoC).
[9] Henk C. A. van Tilborg,et al. Encyclopedia of Cryptography and Security, 2nd Ed , 2005 .
[10] Jasper G. J. van Woudenberg,et al. Practical Optical Fault Injection on Secure Microcontrollers , 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[11] Fabrizio De Santis,et al. Low-Cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go? , 2017, COSADE.
[12] Samy Bengio,et al. Links between perceptrons, MLPs and SVMs , 2004, ICML.
[13] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[14] Lejla Batina,et al. Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection , 2013, CARDIS.
[15] Alexander LeNail,et al. NN-SVG: Publication-Ready Neural Network Architecture Schematics , 2019, J. Open Source Softw..
[16] Sylvain Guilley,et al. Side-channel analysis and machine learning: A practical perspective , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[17] Assia Tria,et al. Invasive Attacks , 2005, Encyclopedia of Cryptography and Security.
[18] Cécile Canovas,et al. Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing , 2017, CHES.
[19] Sergei Skorobogatov,et al. Optical Fault Masking Attacks , 2010, 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[20] Lejla Batina,et al. Evolving genetic algorithms for fault injection attacks , 2014, 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[21] Dengguo Feng,et al. Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing , 2005, IACR Cryptol. ePrint Arch..
[22] Christophe Giraud,et al. DFA on AES , 2004, AES Conference.
[23] Ross J. Anderson,et al. Optical Fault Induction Attacks , 2002, CHES.
[24] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[25] Lejla Batina,et al. Fault Injection with a New Flavor: Memetic Algorithms Make a Difference , 2015, COSADE.
[26] Lejla Batina,et al. Genetic Algorithm-Based Electromagnetic Fault Injection , 2018, 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).
[27] M. Kuhn,et al. The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .
[28] Annelie Heuser,et al. The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations , 2018, IACR Cryptol. ePrint Arch..