Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/80634
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBreier, Jakuben_US
dc.contributor.authorJap, Dirmantoen_US
dc.contributor.authorBhasin, Shivamen_US
dc.date.accessioned2016-07-07T07:24:59Zen
dc.date.accessioned2019-12-06T13:53:36Z-
dc.date.available2016-07-07T07:24:59Zen
dc.date.available2019-12-06T13:53:36Z-
dc.date.copyright2016en
dc.date.issued2016-
dc.identifier.citationBreier, J., Jap, D., & Bhasin, S. (2016). The Other Side of The Coin: Analyzing Software Encoding Schemes Against Fault Injection Attacks. 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 209-216.en_US
dc.identifier.issn193450-
dc.identifier.urihttps://hdl.handle.net/10356/80634-
dc.description.abstractThe versatility and cost of embedded systems have made it ubiquitous. Such wide-application exposes an embedded system to a variety of physical threats like side-channel attacks (SCA) and fault attacks (FA). Recently, a couple of software encoding schemes were proposed as a protection against SCA. These protection schemes are based on dual-rail precharge logic (DPL), previously shown resistant to both SCA and FA. In this paper, we analyze the previously proposed software encoding schemes against FA. Our results show that software encoding offers only limited resistance to FA. Finally, improvement to software-encoding schemes is improved. With this improvement, software encoding can serve as a common SCA and FA countermeasure with an exploitable fault probability as low as 0.0048.en_US
dc.format.extent8 p.en
dc.language.isoenen_US
dc.rights© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: [http://doi.ieeecomputersociety.org/10.1109/HST.2016.7495584].en_US
dc.subjectEncodingen_US
dc.subjectSoftwareen_US
dc.titleThe Other Side of The Coin: Analyzing Software Encoding Schemes Against Fault Injection Attacksen_US
dc.typeConference Paperen
dc.contributor.schoolSchool of Physical and Mathematical Sciencesen_US
dc.contributor.conference2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)en_US
dc.identifier.doi10.1109/HST.2016.7495584-
dc.description.versionAccepted versionen_US
dc.identifier.rims193450en
item.grantfulltextopen-
item.fulltextWith Fulltext-
Appears in Collections:SPMS Conference Papers
Files in This Item:
File Description SizeFormat 
host2016_camera_ready.pdf295.07 kBAdobe PDFThumbnail
View/Open

SCOPUSTM   
Citations 20

10
Updated on Jan 26, 2023

Page view(s) 50

378
Updated on Feb 1, 2023

Download(s) 50

146
Updated on Feb 1, 2023

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.