2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2016
DOI: 10.1109/hst.2016.7495562
|View full text |Cite
|
Sign up to set email alerts
|

Blinded random corruption attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2017
2017

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Similar to our replay attack, Branco et al [5] exploit the lack of memory authentication to compromise an encrypted system. The compromise is accomplished by injecting faults into critical state areas of the login process via the JTAG interface.…”
Section: Attacksmentioning
confidence: 99%
“…Similar to our replay attack, Branco et al [5] exploit the lack of memory authentication to compromise an encrypted system. The compromise is accomplished by injecting faults into critical state areas of the login process via the JTAG interface.…”
Section: Attacksmentioning
confidence: 99%