Encyclopedia of Cryptography and Security
DOI: 10.1007/0-387-23483-7_205
|View full text |Cite
|
Sign up to set email alerts
|

Invasive Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…The main difference between the non-invasive and invasive attacks is in the approach of attacking the TOEs. To perform an invasive attack, it is required to remove at least part of the passivation layer to establish the contact between the probes and silicon [16]. Non-invasive attacks, on the other hand, mainly focus on investigating the settings that can be controlled externally [17], or passively measuring the running time, the cache behavior, the power consumption, and/or the electromagnetic radiation of the device through the package [18].…”
Section: Fault Injection Attacksmentioning
confidence: 99%
“…The main difference between the non-invasive and invasive attacks is in the approach of attacking the TOEs. To perform an invasive attack, it is required to remove at least part of the passivation layer to establish the contact between the probes and silicon [16]. Non-invasive attacks, on the other hand, mainly focus on investigating the settings that can be controlled externally [17], or passively measuring the running time, the cache behavior, the power consumption, and/or the electromagnetic radiation of the device through the package [18].…”
Section: Fault Injection Attacksmentioning
confidence: 99%
“…Finally, invasive attacks access the internals of a chip. These include approaches such as decapsulation (a procedure where the chip packaging is removed), microprobing (where the attacker can probe the internals of a chip), chemical attacks that can reveal information stored in read-only memory, and scanning electron microscope (SEM) attacks (which are able to read RAM memory) [27]. These attacks typically require specialized labs and expensive equipment.…”
Section: Attacker's Level Of Accessmentioning
confidence: 99%
“…Both these works show that, despite the robustness of neural networks to random perturbations, networks are highly susceptible to targeted bit-flips, in a manner similar to non-targeted adversarial attacks [58]. While we have not been able to find any examples of this, we expect neural network accelerators to be vulnerable to cold boot attacks [59], which may be able to steal unencrypted models stored in volatile memory, or microprobing [27], which may be able to bypass model or user data decryption.…”
Section: Attacks On Deployed Neural Networkmentioning
confidence: 99%
“…The value of this equipment may far exceed the value of the targets being attacked. The attack process is also complicated, and even an experienced attacker may take several months, resulting in higher attack costs [31]. Therefore, attacks such as physical side-channel attacks, code injection attacks, and other complex physical attacks are out of the scope of our research.…”
Section: Threat Modelmentioning
confidence: 99%