ISBN:978-0-7695-3598-2International audienceSRAM-based FPGAs are an appealing platform to implement many systems, including secure ones. However, secure systems are subject to attacks and one of the main threats is fault-based attacks using lasers. The sensitivity of the configuration memory in a SRAM-based FPGA has to be studied in this context. This paper reports on the characterization of the effective laser spot, or effective sensitive area, with respect to the laser focus and to the attacked configuration bits. The test vehicle is a Virtex II FPGA. It is shown in particular that the initial value of the bit has a strong influence on the effective sensitive area of the spot. Such data can be used to better understand the actual effects ...
Thermal laser stimulation (TLS) is a failure analysis technique, which can be deployed by an adversa...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
ISBN : 978-1-4244-1825International audienceCircuits used in security-related applications must be r...
ISBN : 978-0-7695-3264-6International audienceDue to their reconfigurability and their high density ...
ISBN : 978-2-84813-124-5International audienceThis paper summarizes the main types of attacks that c...
ISBN : 978-2-84813-136-8Security of digital processing is important in our society. Many application...
FPGAs have emerged as a popular platform for security sensitive applications. As a practical attack ...
ISBN 978-1-4244-5833-2International audienceProgrammable devices like SRAM-based FPGAs, thanks to th...
ISBN 978-1-4244-6965-9International audienceLaser-based fault injections are currently the most effi...
This thesis deals primarily with the analysis of the functionaleffects of errors in the configuratio...
International audienceProgrammable devices are an interesting alternative when implementing embedded...
Fault injection attacks have been widely investigated in both academia and industry during the past ...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
International audienceThe use of a laser as a means to inject errors during the computations of a se...
The ubiquitous use of critical and private data in electronic format requires reliable and secure em...
Thermal laser stimulation (TLS) is a failure analysis technique, which can be deployed by an adversa...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
ISBN : 978-1-4244-1825International audienceCircuits used in security-related applications must be r...
ISBN : 978-0-7695-3264-6International audienceDue to their reconfigurability and their high density ...
ISBN : 978-2-84813-124-5International audienceThis paper summarizes the main types of attacks that c...
ISBN : 978-2-84813-136-8Security of digital processing is important in our society. Many application...
FPGAs have emerged as a popular platform for security sensitive applications. As a practical attack ...
ISBN 978-1-4244-5833-2International audienceProgrammable devices like SRAM-based FPGAs, thanks to th...
ISBN 978-1-4244-6965-9International audienceLaser-based fault injections are currently the most effi...
This thesis deals primarily with the analysis of the functionaleffects of errors in the configuratio...
International audienceProgrammable devices are an interesting alternative when implementing embedded...
Fault injection attacks have been widely investigated in both academia and industry during the past ...
Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault atta...
International audienceThe use of a laser as a means to inject errors during the computations of a se...
The ubiquitous use of critical and private data in electronic format requires reliable and secure em...
Thermal laser stimulation (TLS) is a failure analysis technique, which can be deployed by an adversa...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
ISBN : 978-1-4244-1825International audienceCircuits used in security-related applications must be r...