Skip Content
You are currently on the new version of our website. Access the old version .

Cryptography, Volume 5, Issue 2

2021 June - 4 articles

Cover Story: Determining the root cause of software errors induced by fault injection attacks is no easy task, as fault manifestation is impacted by the device instruction set, microarchitecture, physical circuit layout, and manufacturing process. Current methods for simulating the effects of fault attacks on embedded software either abstract away the processor details in favor of software level analysis or lose the context of software-level behavior to support more detailed hardware analysis. Our automated fault evaluation framework, SimpliFI, uses a combination of software-centric test case design and low-level hardware fault simulation to provide detailed insight into how a fault propagates through the hardware to cause software-level errors. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (4)

  • Article
  • Open Access
9 Citations
6,967 Views
25 Pages

Fault injection simulation on embedded software is typically captured using a high-level fault model that expresses fault behavior in terms of programmer-observable quantities. These fault models hide the true sensitivity of the underlying processor...

  • Article
  • Open Access
9 Citations
5,936 Views
27 Pages

Associative Blockchain for Decentralized PKI Transparency

  • Xavier Boyen,
  • Udyani Herath,
  • Matthew McKague and
  • Douglas Stebila

The conventional public key infrastructure (PKI) model, which powers most of the Internet, suffers from an excess of trust into certificate authorities (CAs), compounded by a lack of transparency which makes it vulnerable to hard-to-detect targeted s...

  • Article
  • Open Access
3,438 Views
17 Pages

CONFISCA: An SIMD-Based Concurrent FI and SCA Countermeasure with Switchable Performance and Security Modes

  • Ehsan Aerabi,
  • David Hély,
  • Cyril Bresch,
  • Athanasios Papadimitriou and
  • Mahdi Fazeli

CONFISCA is the first generic SIMD-based software countermeasure that can concurrently resist against Side-Channel Attack (SCA) and Fault Injection (FI). Its promising strength is presented in a PRESENT cipher case study and compared to software-base...

  • Article
  • Open Access
2 Citations
4,971 Views
30 Pages

Grid Cyber-Security Strategy in an Attacker-Defender Model

  • Yu-Cheng Chen,
  • Vincent John Mooney and
  • Santiago Grijalva

The progression of cyber-attacks on the cyber-physical system is analyzed by the Probabilistic, Learning Attacker, and Dynamic Defender (PLADD) model. Although our research does apply to all cyber-physical systems, we focus on power grid infrastructu...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X