[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Beringuier-Boher et al., 2014 - Google Patents

Voltage glitch attacks on mixed-signal systems

Beringuier-Boher et al., 2014

Document ID
2804596915674358334
Author
Beringuier-Boher N
Gomina K
Hely D
Rigaud J
Beroulle V
Tria A
Damiens J
Gendrier P
Candelier P
Publication year
Publication venue
2014 17th Euromicro Conference on Digital System Design

External Links

Snippet

Supply voltage glitches are a well-known fault injection method used to attack electronic circuits. The aim of this paper is to identify the specific threats of mixed signal systems and to provide some solutions to ensure their security. Indeed, many Systems on Chip use both …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • G06F17/5022Logic simulation, e.g. for logic circuit operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/3181Functional testing
    • G01R31/3185Reconfiguring for testing, e.g. LSSD, partitioning
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5068Physical circuit design, e.g. layout for integrated circuits or printed circuit boards
    • G06F17/5081Layout analysis, e.g. layout verification, design rule check
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/30Marginal testing, e.g. varying supply voltage
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/04Generating or distributing clock signals or signals derived directly therefrom
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2217/00Indexing scheme relating to computer aided design [CAD]
    • G06F2217/70Fault tolerant, i.e. transient fault suppression
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks

Similar Documents

Publication Publication Date Title
Beringuier-Boher et al. Voltage glitch attacks on mixed-signal systems
Krautter et al. Mitigating electrical-level attacks towards secure multi-tenant FPGAs in the cloud
Zhang et al. Design of on-chip lightweight sensors for effective detection of recycled ICs
Zick et al. Sensing nanosecond-scale voltage attacks and natural transients in FPGAs
Narasimhan et al. Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach
Yoshimizu Hardware Trojan detection by symmetry breaking in path delays
Manich et al. Detection of probing attempts in secure ICs
Ismari et al. On detecting delay anomalies introduced by hardware trojans
Gomina et al. Power supply glitch attacks: Design and evaluation of detection circuits
Zhang et al. Detection of trojans using a combined ring oscillator network and off-chip transient power analysis
Anik et al. Detecting failures and attacks via digital sensors
Ma et al. On-chip trust evaluation utilizing tdc-based parameter-adjustable security primitive
Das et al. Frequency-independent warning detection sequential for dynamic voltage and frequency scaling in ASICs
Xue et al. Hardware Trojan detection by timing measurement: Theory and implementation
Lee et al. Robust secure shield architecture for detection and protection against invasive attacks
Xue et al. Power analysis-based Hardware Trojan detection
Abbassi et al. McSeVIC: A model checking based framework for security vulnerability analysis of integrated circuits
Kriebel et al. ACSEM: Accuracy-configurable fast soft error masking analysis in combinatorial circuits
Khalid et al. Forasec: Formal analysis of hardware trojan-based security vulnerabilities in sequential circuits
Deepthi Hardware trojan detection using ring oscillator
Rajendran et al. Sok: Physical and logic testing techniques for hardware trojan detection
Deyati et al. High resolution pulse propagation driven Trojan detection in digital logic: optimization algorithms and infrastructure
Guimarães Testing Techniques for Detection of Hardware Trojans in Integrated Circuits of Trusted Systems
Li et al. Modeling and analysis of single-event transient sensitivity of a 65 nm clock tree
Viera et al. Assessing body built-in current sensors for detection of multiple transient faults