Injection technologies for fault attacks on microprocessors

7Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The dependability of computing systems running cryptographic primitives is a critical factor for evaluating the practical security of any cryptographic scheme. Indeed, the observation of erroneous results produced by a computing device after the artificial injection of transient faults is one of the most effective side-channel attacks. This chapter reviews the (semi-)invasive fault injection techniques that have been successfully used to recover the secret parameters of a cryptographic component. Subsequently, a complete characterization of the fault model derived from the constant underfeeding of a general-purpose microprocessor is described, in order to infer how the faulty behavior causes exploitable software errors.

Cite

CITATION STYLE

APA

Barenghi, A., Bertoni, G. M., Breveglieri, L., Pelliccioli, M., & Pelosi, G. (2012). Injection technologies for fault attacks on microprocessors. In Information Security and Cryptography (Vol. 17, pp. 275–293). Springer International Publishing. https://doi.org/10.1007/978-3-642-29656-7_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free