The thesis deals with attacks that cause faults in CPU and MCU calculations. A short voltage change in CPU or MCU is used to trigger the error. The theoretical part of the thesis deals with the description of how to cause and exploit these errors. This section also describes the most well-known protection against hardware attacks, which is a trusted execution environment (TEE). Inject a fault to TEE is the primary target of fault attacks. The practical part deals with the replication of PlunderVolt and VoltPillager attacks on Intel processors with an activated TEE SGX. Several experiments were performed to trigger faults in RSA and AES encryption within the SGX enclave. To obtain the encryption key from these errors, known analysis methods ...
Hardware designers invest a significant design effort when implementing computationally intensive cr...
This research provides a set of methods, tools and design guidelines that help a designer to constr...
The effect of faults on electronic systems has been studied since the 1970s when it was noticed that...
Implementations of cryptographic algorithms continue to proliferate in consumer products due to the ...
International audienceImplementations of cryptographic algorithms continue to proliferate in consume...
The dependability of computing systems running cryptographic primitives is a critical factor for eva...
Abstract—Fault injection attacks have proven in recent times a powerful tool to exploit implementati...
Fault injection attacks have proven to be a powerful tool to exploit the implementation weaknesses o...
The adoption of Microprocessors is increasingly diversifying to several embedded and mo- bile device...
This repository contains data to reproduce results from the paper "Plundervolt: Software-based Fault...
Faults attacks are a serious threat to secure devices, because they are powerful and they can be per...
Dynamic frequency and voltage scaling features have been introduced to manage ever-growing heat and ...
Presented on October 28, 2016 at 12:00 p.m. in the Pettit Microelectronics Research Building, MIRC R...
Abstract—Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust ...
International audienceThe secret keys handled by cryptographic devices can be extracted using fault ...
Hardware designers invest a significant design effort when implementing computationally intensive cr...
This research provides a set of methods, tools and design guidelines that help a designer to constr...
The effect of faults on electronic systems has been studied since the 1970s when it was noticed that...
Implementations of cryptographic algorithms continue to proliferate in consumer products due to the ...
International audienceImplementations of cryptographic algorithms continue to proliferate in consume...
The dependability of computing systems running cryptographic primitives is a critical factor for eva...
Abstract—Fault injection attacks have proven in recent times a powerful tool to exploit implementati...
Fault injection attacks have proven to be a powerful tool to exploit the implementation weaknesses o...
The adoption of Microprocessors is increasingly diversifying to several embedded and mo- bile device...
This repository contains data to reproduce results from the paper "Plundervolt: Software-based Fault...
Faults attacks are a serious threat to secure devices, because they are powerful and they can be per...
Dynamic frequency and voltage scaling features have been introduced to manage ever-growing heat and ...
Presented on October 28, 2016 at 12:00 p.m. in the Pettit Microelectronics Research Building, MIRC R...
Abstract—Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust ...
International audienceThe secret keys handled by cryptographic devices can be extracted using fault ...
Hardware designers invest a significant design effort when implementing computationally intensive cr...
This research provides a set of methods, tools and design guidelines that help a designer to constr...
The effect of faults on electronic systems has been studied since the 1970s when it was noticed that...