2020
DOI: 10.1145/3410336
|View full text |Cite
|
Sign up to set email alerts
|

FaultDroid

Abstract: Fault attacks belong to a potent class of implementation-based attacks that can compromise a crypto-device within a few milliseconds. Out of the large numbers of faults that can occur in the device, only a very few are exploitable in terms of leaking the secret key. Ignorance of this fact has resulted in countermeasures that have either significant overhead or inadequate protection. This article presents a framework, referred to as FaultDroid, for automated vulnerability analysis of fault attacks. It explores … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 38 publications
0
2
0
Order By: Relevance
“…It can control the related facilities in the substation and provide the network interface matched with the system. The independence of each unit in the compartment is very strong, and emergency manual operation jumps are reserved, which will not affect each other at ordinary times [7][8].…”
Section: Composition Of Substation Automation Monitoring Systemmentioning
confidence: 99%
“…It can control the related facilities in the substation and provide the network interface matched with the system. The independence of each unit in the compartment is very strong, and emergency manual operation jumps are reserved, which will not affect each other at ordinary times [7][8].…”
Section: Composition Of Substation Automation Monitoring Systemmentioning
confidence: 99%
“…Roy et al believe that glitch attacks are a powerful implementation-based attack that can destroy encrypted devices within a few milliseconds. Among the large number of failures that may occur in the device, only a very small number can leak the key, but this failure can easily cause a large amount of information to be leaked [6]. Gao et al proposed a quantum dialogue protocol using asymmetric quantum channels.…”
Section: Introductionmentioning
confidence: 99%