Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/80634
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Breier, Jakub | en_US |
dc.contributor.author | Jap, Dirmanto | en_US |
dc.contributor.author | Bhasin, Shivam | en_US |
dc.date.accessioned | 2016-07-07T07:24:59Z | en |
dc.date.accessioned | 2019-12-06T13:53:36Z | - |
dc.date.available | 2016-07-07T07:24:59Z | en |
dc.date.available | 2019-12-06T13:53:36Z | - |
dc.date.copyright | 2016 | en |
dc.date.issued | 2016 | - |
dc.identifier.citation | Breier, J., Jap, D., & Bhasin, S. (2016). The Other Side of The Coin: Analyzing Software Encoding Schemes Against Fault Injection Attacks. 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 209-216. | en_US |
dc.identifier.issn | 193450 | - |
dc.identifier.uri | https://hdl.handle.net/10356/80634 | - |
dc.description.abstract | The versatility and cost of embedded systems have made it ubiquitous. Such wide-application exposes an embedded system to a variety of physical threats like side-channel attacks (SCA) and fault attacks (FA). Recently, a couple of software encoding schemes were proposed as a protection against SCA. These protection schemes are based on dual-rail precharge logic (DPL), previously shown resistant to both SCA and FA. In this paper, we analyze the previously proposed software encoding schemes against FA. Our results show that software encoding offers only limited resistance to FA. Finally, improvement to software-encoding schemes is improved. With this improvement, software encoding can serve as a common SCA and FA countermeasure with an exploitable fault probability as low as 0.0048. | en_US |
dc.format.extent | 8 p. | en |
dc.language.iso | en | en_US |
dc.rights | © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: [http://doi.ieeecomputersociety.org/10.1109/HST.2016.7495584]. | en_US |
dc.subject | Encoding | en_US |
dc.subject | Software | en_US |
dc.title | The Other Side of The Coin: Analyzing Software Encoding Schemes Against Fault Injection Attacks | en_US |
dc.type | Conference Paper | en |
dc.contributor.school | School of Physical and Mathematical Sciences | en_US |
dc.contributor.conference | 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) | en_US |
dc.identifier.doi | 10.1109/HST.2016.7495584 | - |
dc.description.version | Accepted version | en_US |
dc.identifier.rims | 193450 | en |
item.grantfulltext | open | - |
item.fulltext | With Fulltext | - |
Appears in Collections: | SPMS Conference Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
host2016_camera_ready.pdf | 295.07 kB | Adobe PDF | ![]() View/Open |
SCOPUSTM
Citations
20
10
Updated on Jan 26, 2023
Page view(s) 50
378
Updated on Feb 1, 2023
Download(s) 50
146
Updated on Feb 1, 2023
Google ScholarTM
Check
Altmetric
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.