2014 17th Euromicro Conference on Digital System Design 2014
DOI: 10.1109/dsd.2014.14
|View full text |Cite
|
Sign up to set email alerts
|

Voltage Glitch Attacks on Mixed-Signal Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
14
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(15 citation statements)
references
References 19 publications
0
14
0
Order By: Relevance
“…One of the well-known types of active attacks widely studied during the last two decades is fault injection attack (FIA). FIAs are usually accomplished by manipulating either environmental parameters or inputs [27][28][29]. FIA has been demonstrated to be a powerful technique to reveal secret data with a small number of experiments [12,30].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…One of the well-known types of active attacks widely studied during the last two decades is fault injection attack (FIA). FIAs are usually accomplished by manipulating either environmental parameters or inputs [27][28][29]. FIA has been demonstrated to be a powerful technique to reveal secret data with a small number of experiments [12,30].…”
Section: Introductionmentioning
confidence: 99%
“…Fault injection attacks can be further classified into three different categories, namely, invasive, non-invasive, and semi-invasive [28]. Invasive attacks are the type of intrusions performed by de-packaging the integrated circuit (IC) and modifying the physical properties to do some probing.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…According to the SoC design technique, the analog and digital intellectual property (IP) cores are delivered by third parties and the IC designer only works on the interconnection structure between the provided modules and constructing the top module. In other words, the main circuit is built by the analog and digital sub-circuits given by external sources [1][2][3].…”
Section: Introductionmentioning
confidence: 99%
“…We define the BIST module as the central intelligence unit (CIU) in the hardware security terminology. Many research works were done for security checking and protection provision in the digital domain [11,12], while only a few studies are seen in the analog/mixed-signal domain [15][16][17][18][19][20][21]. Due to this lack of knowledge, more research needs to be done in the area of analog/mixed-signal hardware security in order to find and develop related threats and countermeasures.…”
Section: Introductionmentioning
confidence: 99%