Laser fault injection (LFI) attack on cryptographic processors is a serious threat to information security. This paper proposes a sense-and-react countermeasure against LFI. A distributed bulk-current sensor monitors the abnormal current conduction caused by laser irradiation to a silicon substrate. The single sensor occupies only 286 F-2/Cell and it is distributed across the entire cryptographic core for 100% attack detection coverage. Upon detection of LFI attack, a flush code eraser prevents a leakage of faulty ciphertext by immediately shunting the core supply path within nano-second order. In addition, the core supply during the shunting is electrically isolated from the global supply line to prevent side-channel information leakage of...
Electromagnetic injection (EMI) is a powerful and precise technique for fault injection in modern IC...
Fault injection attacks have been widely investigated in both academia and industry during the past ...
International audienceHardware implementations of cryptographic algorithms can be beneficial from a ...
International audienceNowadays, the security level of secure integrated circuits makes simple attack...
International audienceLaser is an effective mean to inject faults in a secure circuit and then to pe...
International audienceIntegrated circuits (ICs) laser illumination was originally used for emulation...
Laser-based fault injection (LFI) is considered as one of the most powerful tools for active attacks...
International audienceAmong all means to attack a security dedicated circuit, fault injection by mea...
DeepCover is a secure authenticator circuit family developed by Analog Devices. It was designed to p...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
Lightweight cryptography has been widely utilized in resource constrained embedded devices of Cyber-...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
International audienceSecure integrated circuits that implement cryptographic algorithms (e.g., AES)...
Internet of Things (IoT) is becoming more integrated in our daily life with the increasing number of...
International audienceLaser fault injection through the front side (and consequently the metal-fills...
Electromagnetic injection (EMI) is a powerful and precise technique for fault injection in modern IC...
Fault injection attacks have been widely investigated in both academia and industry during the past ...
International audienceHardware implementations of cryptographic algorithms can be beneficial from a ...
International audienceNowadays, the security level of secure integrated circuits makes simple attack...
International audienceLaser is an effective mean to inject faults in a secure circuit and then to pe...
International audienceIntegrated circuits (ICs) laser illumination was originally used for emulation...
Laser-based fault injection (LFI) is considered as one of the most powerful tools for active attacks...
International audienceAmong all means to attack a security dedicated circuit, fault injection by mea...
DeepCover is a secure authenticator circuit family developed by Analog Devices. It was designed to p...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
Lightweight cryptography has been widely utilized in resource constrained embedded devices of Cyber-...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
International audienceSecure integrated circuits that implement cryptographic algorithms (e.g., AES)...
Internet of Things (IoT) is becoming more integrated in our daily life with the increasing number of...
International audienceLaser fault injection through the front side (and consequently the metal-fills...
Electromagnetic injection (EMI) is a powerful and precise technique for fault injection in modern IC...
Fault injection attacks have been widely investigated in both academia and industry during the past ...
International audienceHardware implementations of cryptographic algorithms can be beneficial from a ...