نتایج جستجو برای: fault injection

تعداد نتایج: 219704  

2004
BARRY W. JOHNSON

TODD A. DELONG BARRY W. JOHNSON Universiiy of Virginia JOSEPH A. PROFETA 111 Union Switch and Signal, Inc. AS EARLY AS THE 1960~, designers recognized the importance of incorporating fault tolerance into microelectronic designs. However, they often performed this task late in the process when the design was near completion. As computer systems become more complex, designers must consider fault ...

2002
Jean Arlat

This short contribution describes first the role of fault injection among the dependability assessment methods that are pertinent approach to the definition and development of dependability benchmarks. Specific problems and challenges faced by dependability benchmarking are then identified and some relevant advances are discussed. 1. Fault Injection-based Experimental Assessment Fault injection...

2012
Julien Lancia

In this paper, we present a paradigm for combined attacks on Java Cards that lowers the requirements on the localization precision of the fault injection. The attack relies on educated objects allocation to create favorable memory patterns that raise the chances of success of the combined attack. In order to maximize the probability of successful injection, we determine the optimal parameters d...

2010
Yang Li Shigeto Gomisawa Kazuo Sakiyama Kazuo Ohta

Di erential Fault Analysis (DFA) against AES has been actively studied these years. Based on similar assumptions of the fault injection, di erent DFA attacks against AES have been proposed. However, it is di cult to understand how di erent attack results are obtained for the same assumption of fault injection. It is also di cult to understand the relationship between similar assumptions of faul...

2016
Shivam Bhasin Debdeep Mukhopadhyay

Fault Injection Attacks are a powerful form of active attack mechanism which can threaten even the strongest of cryptographic algorithms. This attack vector has become more pertinent with the growing popularity of the Internet of things (IoT), which is based on small omnipresent embedded systems interacting with sensitive data of personal or critical nature. This tutorial addresses this issue o...

2001
Eric Marsden Jean-Charles Fabre

This document describes a method and experimental results for the dependability characterization of middleware implementations, and in particular failure mode analysis of CORBA ORB implementations. The aim of the work is to provide an overall approach for identifying and quantifying failure modes using various fault injection techniques and fault models. Related work in dependability characteri...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده برق و کامپیوتر 1388

با توجه به این که در سیستم های صنعتی وقوع fault ممکن است منجر به خرابی کالا، خرابی دستگاه، افت عملکرد و یا تلفات جانی شود، شناسایی و تشخیص به موقع fault و همچنین جبران سازی آن از اهمیت کاربردی بسیار بالایی برخوردار می باشد. عمده ی سیستم های صنعتی را سیستم های غیر خطی و هایبرید با ورودی ها یا حالت های ناهمگون تشکیل می دهند. بنابراین شناسایی fault در این سیستم ها و تلاش برای جبران اثرات آن به کمک...

2013
Anton Biasizzo Franc Novak Jozef Stefan

In this paper, we describe our current work on developing tools for experimental evaluation of the efficiency of implemented countermeasures against differential fault attacks on cryptographic cores in the FPGA based systems. The developed fault injection platform enables us to analyze the impact of injected faults at the selected points of the FPGA in its run time operation. In its compact ver...

2002
Eric Marsden Jean-Charles Fabre

This document describes a number of approaches for the dependability characterization of middleware implementations, and in particular failure mode analysis of CORBA ORB implementations. The aim of the work is to provide an overall approach for identifying and quantifying failure modes using various fault injection techniques and fault models. Related work in dependability characterization of e...

2013
Guillaume Barbu Alberto Battistello Guillaume Dabosville Christophe Giraud Guénaël Renault Soline Renner Rina Zeitoun

This article introduces a new Combined Attack on a CRTRSA implementation resistant against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the attacker from obtaining the signature when a fault has been induced during the computation. Indeed, such a value would allow the attacker to recover the RSA private key by computing the gcd of the public modulus and the fa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید