2020
DOI: 10.1016/j.vlsi.2019.11.006
|View full text |Cite
|
Sign up to set email alerts
|

A survey on fault injection methods of digital integrated circuits

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(27 citation statements)
references
References 28 publications
0
27
0
Order By: Relevance
“…• Dynamic Analysis Tools: The tools, which perform runtime, post mortem, or both. The Fault is injected into the circuit, and then the different input vectors are simulated in the circuit to compute faults [16]. It is helpful to use both kinds of analysis, i.e., static and dynamic kernel modules testing [17].…”
Section: Methodology and Experimental Setupmentioning
confidence: 99%
“…• Dynamic Analysis Tools: The tools, which perform runtime, post mortem, or both. The Fault is injected into the circuit, and then the different input vectors are simulated in the circuit to compute faults [16]. It is helpful to use both kinds of analysis, i.e., static and dynamic kernel modules testing [17].…”
Section: Methodology and Experimental Setupmentioning
confidence: 99%
“…However, the proposed metric is specific to cryptography software implementations used in smartcard devices. Eslami et al [22] presented a survey that brought together and compared hardware-based and software-based approaches to simulate fault injection attacks on digital devices. The survey covered hardware-based fault injection and emulation-based fault injection using circuit instrumentation techniques and hardware reconfiguration.…”
Section: Related Workmentioning
confidence: 99%
“…A hardware security assessment can be performed either by applying practical techniques, including simulations and experimental techniques, or by using mathematical analysis methods [12,[14][15][16]. Today's simulation tools have extensive capabilities, and they can be used as highly accurate, flexible, and low-cost appliances in primary evaluation.…”
Section: Introductionmentioning
confidence: 99%
“…Security evaluation against fault attacks is a key step in the design of any IoT device that needs to adhere to specific security requirements [16,35]. To this end, hardware security specialists should design an efficient evaluation platform for the embedded software developers of critical IoTs.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation