Detecting Electromagnetic Injection Attack on FPGAs Using In-situ Timing Sensors
- 16 June 2020
- journal article
- research article
- Published by Springer Science and Business Media LLC in Journal of Hardware and Systems Security
- Vol. 4 (3), 196-207
- https://doi.org/10.1007/s41635-020-00096-9
Abstract
No abstract availableKeywords
Funding Information
- National Science Foundation (1441710)
- Semiconductor Research Corporation (1441710)
This publication has 17 references indexed in Scilit:
- PLL to the rescuePublished by Association for Computing Machinery (ACM) ,2016
- A Fully-Digital EM Pulse DetectorPublished by Research Publishing Services ,2016
- EM Injection: Fault Model and LocalityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Evidence of a Larger EM-Induced Fault ModelPublished by Springer Science and Business Media LLC ,2015
- Efficiency of a glitch detector against electromagnetic fault injectionPublished by EDAA ,2014
- Efficiency of a glitch detector against electromagnetic fault injectionPublished by EDAA ,2014
- Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit MicrocontrollerPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- An introduction to ROC analysisPattern Recognition Letters, 2005
- Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)Lecture Notes in Computer Science, 2003
- On the Importance of Checking Cryptographic Protocols for FaultsLecture Notes in Computer Science, 1997