2023
DOI: 10.3390/s23167180
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Approach of a Low-Cost Voltage Fault Injection Method for Resource-Constrained IoT Devices: Design and Analysis

Nicolás Ruminot,
Claudio Estevez,
Samuel Montejo-Sánchez

Abstract: The rapid development of the Internet of Things (IoT) has brought about the processing and storage of sensitive information on resource-constrained devices, which are susceptible to various hardware attacks. Fault injection attacks (FIAs) stand out as one of the most widespread. Particularly, voltage-based FIAs (V-FIAs) have gained popularity due to their non-invasive nature and high effectiveness in inducing faults by pushing the IoT hardware to its operational limits. Improving the security of devices and ga… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 29 publications
0
1
0
Order By: Relevance
“…In practical experiments, various methods can be employed to inject faults [26][27][28][29][30][31][32][33][34], including variations in the operational voltage, clock, or temperature of the circuit, electromagnetic pulse interference with circuit operation, utilization of laser, UV-ray, X-ray, or focused ion beam (FIB), etc. In addition to this, the rest of the key recovery processes are all accomplished through computer computations.…”
Section: Experiments About Our Combined Analysis On Picomentioning
confidence: 99%
“…In practical experiments, various methods can be employed to inject faults [26][27][28][29][30][31][32][33][34], including variations in the operational voltage, clock, or temperature of the circuit, electromagnetic pulse interference with circuit operation, utilization of laser, UV-ray, X-ray, or focused ion beam (FIB), etc. In addition to this, the rest of the key recovery processes are all accomplished through computer computations.…”
Section: Experiments About Our Combined Analysis On Picomentioning
confidence: 99%