2020
DOI: 10.46586/tches.v2020.i2.272-299
|View full text |Cite
|
Sign up to set email alerts
|

FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers

Abstract: Fault injection attacks are one of the most powerful forms of cryptanalytic attacks on ciphers. A single, precisely injected fault during the execution of a cipher like the AES, can completely reveal the key within a few milliseconds. Software implementations of ciphers, therefore, need to be thoroughly evaluated for such attacks. In recent years, automated tools have been developed to perform these evaluations. These tools either work on the cipher algorithm or on their implementations. Tools that work at the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…AI models learn from a training dataset to develop and hone their search space rather than exhaustively trying all combinations. Tools such as XFC [18], SAFARI [26], FEDS [17], SOLOMON [33] and ALAFA [29] use the concept of non-interference to their advantage, while tools such as DL-FALAT [27], or ExpFault [31], or the ones presented in [30] and [28] employ deep learning and data mining, respectively, to counter the limitations outlined in Sect. 6.…”
Section: Opportunities Of Using Ai Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…AI models learn from a training dataset to develop and hone their search space rather than exhaustively trying all combinations. Tools such as XFC [18], SAFARI [26], FEDS [17], SOLOMON [33] and ALAFA [29] use the concept of non-interference to their advantage, while tools such as DL-FALAT [27], or ExpFault [31], or the ones presented in [30] and [28] employ deep learning and data mining, respectively, to counter the limitations outlined in Sect. 6.…”
Section: Opportunities Of Using Ai Techniquesmentioning
confidence: 99%
“…The target audience for this paper is developers of general-purpose software and not specifically cryptographic implementations. Although many fault simulators [1,5,6,14,[16][17][18]24,[26][27][28][29]31,33] can verify the implementations of cryptographic algorithms, we exclude them in this work because there is already an overview of such tools [4]. We found four fault simulators in the public domain suitable for such a developer, namely FiSim [25], ZOFI [23], ARMORY [13] and ARCHIE [12].…”
Section: Introductionmentioning
confidence: 99%