Beringuier-Boher et al., 2014 - Google Patents
Voltage glitch attacks on mixed-signal systemsBeringuier-Boher et al., 2014
- Document ID
- 2804596915674358334
- Author
- Beringuier-Boher N
- Gomina K
- Hely D
- Rigaud J
- Beroulle V
- Tria A
- Damiens J
- Gendrier P
- Candelier P
- Publication year
- Publication venue
- 2014 17th Euromicro Conference on Digital System Design
External Links
Snippet
Supply voltage glitches are a well-known fault injection method used to attack electronic circuits. The aim of this paper is to identify the specific threats of mixed signal systems and to provide some solutions to ensure their security. Indeed, many Systems on Chip use both …
- 239000000243 solution 0 abstract description 24
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
- G06F17/5022—Logic simulation, e.g. for logic circuit operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/3181—Functional testing
- G01R31/3185—Reconfiguring for testing, e.g. LSSD, partitioning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5068—Physical circuit design, e.g. layout for integrated circuits or printed circuit boards
- G06F17/5081—Layout analysis, e.g. layout verification, design rule check
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/30—Marginal testing, e.g. varying supply voltage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/04—Generating or distributing clock signals or signals derived directly therefrom
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2217/00—Indexing scheme relating to computer aided design [CAD]
- G06F2217/70—Fault tolerant, i.e. transient fault suppression
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Beringuier-Boher et al. | Voltage glitch attacks on mixed-signal systems | |
Krautter et al. | Mitigating electrical-level attacks towards secure multi-tenant FPGAs in the cloud | |
Zhang et al. | Design of on-chip lightweight sensors for effective detection of recycled ICs | |
Zick et al. | Sensing nanosecond-scale voltage attacks and natural transients in FPGAs | |
Narasimhan et al. | Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach | |
Yoshimizu | Hardware Trojan detection by symmetry breaking in path delays | |
Manich et al. | Detection of probing attempts in secure ICs | |
Ismari et al. | On detecting delay anomalies introduced by hardware trojans | |
Gomina et al. | Power supply glitch attacks: Design and evaluation of detection circuits | |
Zhang et al. | Detection of trojans using a combined ring oscillator network and off-chip transient power analysis | |
Anik et al. | Detecting failures and attacks via digital sensors | |
Ma et al. | On-chip trust evaluation utilizing tdc-based parameter-adjustable security primitive | |
Das et al. | Frequency-independent warning detection sequential for dynamic voltage and frequency scaling in ASICs | |
Xue et al. | Hardware Trojan detection by timing measurement: Theory and implementation | |
Lee et al. | Robust secure shield architecture for detection and protection against invasive attacks | |
Xue et al. | Power analysis-based Hardware Trojan detection | |
Abbassi et al. | McSeVIC: A model checking based framework for security vulnerability analysis of integrated circuits | |
Kriebel et al. | ACSEM: Accuracy-configurable fast soft error masking analysis in combinatorial circuits | |
Khalid et al. | Forasec: Formal analysis of hardware trojan-based security vulnerabilities in sequential circuits | |
Deepthi | Hardware trojan detection using ring oscillator | |
Rajendran et al. | Sok: Physical and logic testing techniques for hardware trojan detection | |
Deyati et al. | High resolution pulse propagation driven Trojan detection in digital logic: optimization algorithms and infrastructure | |
Guimarães | Testing Techniques for Detection of Hardware Trojans in Integrated Circuits of Trusted Systems | |
Li et al. | Modeling and analysis of single-event transient sensitivity of a 65 nm clock tree | |
Viera et al. | Assessing body built-in current sensors for detection of multiple transient faults |