2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2022
DOI: 10.1109/host54066.2022.9840177
|View full text |Cite
|
Sign up to set email alerts
|

FTC: A Universal Sensor for Fault Injection Attack Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Due to the relationship between the voltage drop and the delay amount in each buffer unit, the digitized time delay can serve as an indicator of the voltage supply. Hence, the TDC sensor functions as a lightweight oscilloscope integrated into the SiP [89].…”
Section: C2 Mitigation: Against Malware Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the relationship between the voltage drop and the delay amount in each buffer unit, the digitized time delay can serve as an indicator of the voltage supply. Hence, the TDC sensor functions as a lightweight oscilloscope integrated into the SiP [89].…”
Section: C2 Mitigation: Against Malware Attacksmentioning
confidence: 99%
“…(ii) Sensor Placement: Based on the identified locations, we place Fault-to-Time-Converter (FTC) sensor due to its ability to detect various FI attempts (e.g., clock and voltage glitches, EM faults, and laser faults) with minimal overhead [89].…”
Section: F C5 Mitigation Against Fault Injectionmentioning
confidence: 99%
“…To protect against these types of attacks, Rafid Muttaki et al [35] proposed a universal fault detection sensor that can detect invasive and non-invasive FIAs such as voltage glitching.…”
Section: Voltage Glitchesmentioning
confidence: 99%
“…Nevertheless, numerous security experts and designers are actively developing protection and detection mechanisms to mitigate the risks associated with such attacks. For instance, various digital and analog detectors have been proposed to detect the attack before it causes wrong behavior in the devices [3] [4]. The recent works are mostly focused on digital detectors because they can be easily calibrated and placed close to the security primitives such as PUFs and encryption cores.…”
Section: Introductionmentioning
confidence: 99%