International audienceFault Injections (FI) against hardware circuits can make a system inoperable or lead to information security breaches. FI can be used preemptively in order to detect and mitigate weaknesses in a design. FI is an old field of study and therefore numerous techniques and tools can be used for that purpose. Each technique can be used at different levels of circuit design, and has strengths and weaknesses. In this paper, we review these techniques to show their pros and cons and more precisely we highlight their shortcomings with respect to the complexity of modern systems
Our society is faced with an increasing dependence on computing systems, not only in high tech consu...
The increasing need for high-performance dependable systems with and the ongoing strong cost pressur...
International audienceOne of the consequence of the scaling down of latest technologies, is that dig...
International audienceFault Injections (FI) against hardware circuits can make a system inoperable o...
ISBN :2010 ISBN 978-1-4419-6992-7; e-ISBN 978-1-4419-6993-4Hardware fault injection is the widely ac...
International audienceThe secret keys handled by cryptographic devices can be extracted using fault ...
International audienceFault injection techniques have been proposed recently to early analyze the de...
Fault tolerant circuits are currently required in several major application sectors. Besides and in ...
With continuously shrinking semiconductor structure sizes and lower supply voltages, the per-device...
Fault injection is a well known method to test the robustness and security vulnerabilities of softwa...
Active fault injection is a credible threat to real-world digital systems computing on sensitive dat...
International audienceFault injection is a well known method to test the robustness and security vul...
International audienceA new method for injecting faults in the configuration bits of SRAM-based FPGA...
An analysis of the effectiveness of fault injection attacks on smart cards using the transient pulse...
<p>This thesis deals with techniques for designing and evaluating error detection and recovery mecha...
Our society is faced with an increasing dependence on computing systems, not only in high tech consu...
The increasing need for high-performance dependable systems with and the ongoing strong cost pressur...
International audienceOne of the consequence of the scaling down of latest technologies, is that dig...
International audienceFault Injections (FI) against hardware circuits can make a system inoperable o...
ISBN :2010 ISBN 978-1-4419-6992-7; e-ISBN 978-1-4419-6993-4Hardware fault injection is the widely ac...
International audienceThe secret keys handled by cryptographic devices can be extracted using fault ...
International audienceFault injection techniques have been proposed recently to early analyze the de...
Fault tolerant circuits are currently required in several major application sectors. Besides and in ...
With continuously shrinking semiconductor structure sizes and lower supply voltages, the per-device...
Fault injection is a well known method to test the robustness and security vulnerabilities of softwa...
Active fault injection is a credible threat to real-world digital systems computing on sensitive dat...
International audienceFault injection is a well known method to test the robustness and security vul...
International audienceA new method for injecting faults in the configuration bits of SRAM-based FPGA...
An analysis of the effectiveness of fault injection attacks on smart cards using the transient pulse...
<p>This thesis deals with techniques for designing and evaluating error detection and recovery mecha...
Our society is faced with an increasing dependence on computing systems, not only in high tech consu...
The increasing need for high-performance dependable systems with and the ongoing strong cost pressur...
International audienceOne of the consequence of the scaling down of latest technologies, is that dig...