ISBN : 978-0-7695-3264-6International audienceDue to their reconfigurability and their high density of resources, SRAM-based FPGAs are more and more used in embedded systems. For some applications (Pay-TV, Banking, Telecommunication ...), a high level of security is needed. FPGAs are intrinsically sensitive to ionizing effects, such as light stimulation, and attackers can try to exploit faults injected in the downloaded configuration. Previous studies presented the results obtained with multiple laser shots across different elements of the device. The exact effect of a single laser shot was not studied; a global picture of the type of generated errors was rather drawn. This work analyses the effects of a single laser shot onto the configura...
This thesis focuses primarily on the evaluation of the functional effects of errors occurring in the...
International audienceThis paper presents the development of a set of tools and the associated metho...
Fault injection attacks have been widely investigated in both academia and industry during the past ...
ISBN : 978-0-7695-3264-6International audienceDue to their reconfigurability and their high density ...
ISBN:978-0-7695-3598-2International audienceSRAM-based FPGAs are an appealing platform to implement ...
ISBN : 978-2-84813-124-5International audienceThis paper summarizes the main types of attacks that c...
ISBN 978-1-4244-6965-9International audienceLaser-based fault injections are currently the most effi...
This thesis deals primarily with the analysis of the functionaleffects of errors in the configuratio...
This paper is aimed at emulating the errors in semiconductor memories by space radiation with a puls...
ISBN : 978-2-84813-136-8Security of digital processing is important in our society. Many application...
FPGAs have emerged as a popular platform for security sensitive applications. As a practical attack ...
ISBN 978-1-4244-5833-2International audienceProgrammable devices like SRAM-based FPGAs, thanks to th...
State-of-the-art SRAM FPGAs (Field Programmable Gate Arrays) are being increasingly considered for u...
ISBN : 978-2-84813-139-9This work aims at designing a test methodology to analyze the effect of natu...
Cette thèse s'intéresse en premier lieu à l'analyse des effetsfonctionnels des erreurs dans laconfig...
This thesis focuses primarily on the evaluation of the functional effects of errors occurring in the...
International audienceThis paper presents the development of a set of tools and the associated metho...
Fault injection attacks have been widely investigated in both academia and industry during the past ...
ISBN : 978-0-7695-3264-6International audienceDue to their reconfigurability and their high density ...
ISBN:978-0-7695-3598-2International audienceSRAM-based FPGAs are an appealing platform to implement ...
ISBN : 978-2-84813-124-5International audienceThis paper summarizes the main types of attacks that c...
ISBN 978-1-4244-6965-9International audienceLaser-based fault injections are currently the most effi...
This thesis deals primarily with the analysis of the functionaleffects of errors in the configuratio...
This paper is aimed at emulating the errors in semiconductor memories by space radiation with a puls...
ISBN : 978-2-84813-136-8Security of digital processing is important in our society. Many application...
FPGAs have emerged as a popular platform for security sensitive applications. As a practical attack ...
ISBN 978-1-4244-5833-2International audienceProgrammable devices like SRAM-based FPGAs, thanks to th...
State-of-the-art SRAM FPGAs (Field Programmable Gate Arrays) are being increasingly considered for u...
ISBN : 978-2-84813-139-9This work aims at designing a test methodology to analyze the effect of natu...
Cette thèse s'intéresse en premier lieu à l'analyse des effetsfonctionnels des erreurs dans laconfig...
This thesis focuses primarily on the evaluation of the functional effects of errors occurring in the...
International audienceThis paper presents the development of a set of tools and the associated metho...
Fault injection attacks have been widely investigated in both academia and industry during the past ...