Proceedings of the Third Workshop on Cryptography and Security in Computing Systems 2016
DOI: 10.1145/2858930.2858940
|View full text |Cite
|
Sign up to set email alerts
|

Body Biasing Injection Attacks in Practice

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…Finally, the skills and knowledge required to perform them also can be easily and quickly acquired [19]. From the approach perspective, semi-invasive attacks could be performed using a variety of tools such as IR light [20], X-rays [1] and other sources of ionizing radiation, electromagnetic fields [21], and body biasing [22].…”
Section: Fault Injection Attacksmentioning
confidence: 99%
“…Finally, the skills and knowledge required to perform them also can be easily and quickly acquired [19]. From the approach perspective, semi-invasive attacks could be performed using a variety of tools such as IR light [20], X-rays [1] and other sources of ionizing radiation, electromagnetic fields [21], and body biasing [22].…”
Section: Fault Injection Attacksmentioning
confidence: 99%
“…This change is truly drastic 1 . This fantastic rate of innovation has been sustained accurately for 50 years 2 . Therefore, a natural question is thus to re-evaluate the potential of physical attacks given so many changes.…”
Section: Introductionmentioning
confidence: 94%
“…Characterizing ISA faults is an interesting approach when you have no access to the hardware IP. Another approach [4,9] is to focus on characterizing faults at the level of transistors and logic gates.…”
Section: Related Workmentioning
confidence: 99%