The Study on Fault Injection Attack: The analysis and improvement of the experimental precision indicators
![]() |
Kim, HyunHo
(Dongseo University)
Kang, Young-Jin (Dongseo University) Lee, Young-Sil (Dongseo University) Park, Jae-Hoon (Electronics and Telecommunications Research Institute) Kim, Chang-Kyun (Electronics and Telecommunications Research Institute) Lee, HoonJae (Electronics and Telecommunications Research Institute) |
1 | Y. Monnet, M. Renaudin, and F. M'Buwa Nzengust "Practical Evaluation of Fault Countermeasures on an Asynchronous DES Crypto Processor," Proceedings of the 12th IEEE International On-Line Testing Symposium, 2006 |
2 | Sergei Skorobogatov, "Optical Fault masking Attacks," Workshop on Fault diagnosis and Tolerance in Cryptography, pp. 23-29, Aug, 2010 |
3 | Jacques J.A. Fournier and Philippe Loubet-Moundi, "Memory address Scrambling Revealed using Fault Attacks," Workshop on Fault diagnosis and Tolerance in Cryptography, pp. 30-36, Aug. 2010 |
4 | J. G. J. van Woudenberg, M. F. Witteman and Federico Menarini, "Practical Optical Fault Injection on Secure Microcontrollers," Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 91-99, 2011 |
5 | Sergei Skorobogatov, "Local Heating Attacks on Flash Memory Devices," International Workshop on Hardware-Oriented Security and Trust, 2009 |
6 | G. Canivet, J. Clediere, and R. Leveugle, "Detailed Analysises of Single laser Shot Effects in the Configuration of a Virtex-II FPGA," International On-Line Testing Symposium, pp. 289-294, 2008 |
7 | Doo-sik Choi, Yong-Je Choi, and Jae-cheol Ha, "A Late-Round Reduction Attack on the AES Encryption Algorithm Using Fault Injection," Journal of The Korea Institute of information Security & Cryptology, 22(3), pp. 339-445, Jun. 2012 과학기술학회마을 |
8 | KiSeok Bae, JeaHoon Park, and SangJae Moon, "Efficient Fault Injection Attack to the Miller Algorithm in the Pairing Computation using Affine Coordinate System," Journal of The Korea Institute of information Security & Cryptology, 21(3), pp. 11-25, Jun. 2011 과학기술학회마을 |
9 | Doo-sik Choi, Doo-hwan Oh, and Jae-cheol Ha "A Round Reduction Attack on Triple DES Using Fault Injection", Journal of The Korea Institute of information Security & Cryptology, 21(2), pp. 91-100, Apl. 2011 과학기술학회마을 |
10 | JeaHoon Park, KiSeok Bae, and JaeCheol Ha, "A Fault Injection Attack on the For Statement in AES Implementation," Journal of The Korea Institute of information Security & Cryptology, 20(6), pp. 59-65, Dec. 2010 과학기술학회마을 |
11 | JeaHoon Park and JaeCheol Ha, "Improved Differential Fault Analysis on Block Cipher ARIA," International Workshop on Information Security Applications, LNCS 7690, pp. 82-95, 2012 |
12 | E.Trichina. R. Korkikyan, "Multi Fault Laser Attacks on Protected CRT-RSA," Workshop on Fault diagnosis and Tolerance in Cryptography, pp. 75-86, 2010 |
13 | H. Bar-El, H. Choukri, and C. Whelan, "The Sorcerer's Apprentice Guide to Fault Attacks," Proceedings of the IEEE, vol. 94, no. 2, pp. 371-382, Feb. 2006. |
14 | D. Bonech, R. DeMillo and R. Lipton, "New threat model breaks crypto codes," Bellcore Press Release, Sep. 1996. |
15 | Sergei P. Skorobogatov, "Semi-invasive attacks: A new approach to hardware security analysis," Technical Report UCAM-CL-TR-630, University of Cambridge, Apl. 2005. |
16 | Johannes Blömer and Jean-Pierre Seifert, "Fault based cryptanalysis of the Advanced Encryption Standard (AES)," Financial Cryptography, pp. 162-181, 2003. |
17 | C. Aumuller, P. Bier, and J. P. Seifert, "Fault attacks on RSA with CRT: Concrete results and practical countermeasures," Workshop on Cryptographic Hardware and Embedded Systems, LNCS 2523, pp. 260-275, 2002. |
18 | A. Barenghi, G. Bertoni, and G. Pelosi, "Low Voltage Fault Attacks on the RSA cryptosystem," Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.23-31, 2009. |
19 | Sergei P. Skorobogatov and Ross J. Anderson, "Optical Fault Induction Attacks," Workshop on Fault Diagnosis and Tolerance in Cryptography, LNCS 2523, pp. 2-12, 2003. |
20 | O. Kocar, "Hardwaresicherheit von Mikrochips in Chipkarten," Datenschutz and Datensicherheit, vol. 20, no. 7, pp. 421-424, 1996. |
21 | S. Govindavajhala and A. Appel, "Using memory errors to attack a virtual machine," In Proceedings of the IEEE symposium on Security and Privacy, pp. 154-164, May. 2003. |
22 | Oliver Kommerling and Markus G. Kuhn, "Design principles for tamper-resistan smartcard processors," Proceedings of the USENIX Workshop on Smartcard Technology, pp.9-20, May. 1999. |
23 | S. H. Weingart, "Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses," Workshop on Cryptographic Hardware and Embedded Systems, LNCS 1965, pp. 302-317, 2000. |
24 | Elena Trichina and Roman Korkikyan, "Multi Fault Laser Attacks on Protected CRT-RSA," Workshop on Fault diagnosis and Tolerance in Cryptography, pp. 75-86, Aug. 2010 |
25 | Young-Sil Lee, HyunHo Kim and HoonJae Lee, "A study on generalization of Fault-Injection Analysis tools", Dongseo University Industry-Academic Cooperation Foundation, pp. 1-205, Otc. 2013. |
26 | Sergei Skorobogatov, "Low temperature data remanence in static RAM," Technical Report UCAM-CL-TR-536, University of Cambridge, Jun. 2002. |
![]() |