SimpliFI: Hardware Simulation of Embedded Software Fault Attacks
نویسندگان
چکیده
منابع مشابه
Static Fault Attacks on Hardware DES Registers
In the late nineties, Eli Biham and Adi Shamir published the first paper on Differential Fault Analysis on symmetric key algorithms. More specifically they introduced a fault model where a key bit located in non-volatile memory is forced to 0/1 with a fault injection. In their scenario the fault was permanent, and could lead the attacker to full key recovery with low complexity. In this paper, ...
متن کاملSoftware Implemented Hardware Fault Tolerance
This technical report contains the text of Nahmsuk Oh’s thesis “Software Implemented Hardware Fault Tolerance.” FUNDING This work was supported in part by the Ballistic Missile Defense Organization, Innovative Science and Technology (BMDO/IST) Directorate and administered through the Department of the Navy, Office of Naval Research under Grant Nos. N00014-92-J-1782 and N00014-95-1-1047 Copyrigh...
متن کاملEmbedded software verification in hardware-software codesign
Concurrent Embedded Real-Time Software (CERTS) is intrinsically dierent from traditional, sequential, independent, and temporally unconstrained software. The veri®cation of software is more complex than hardware due to inherent ̄exibilities (dynamic behavior) that incur a multitude of possible system states. The veri®cation of CERTS is all the more dicult due to its concurrency and embeddedne...
متن کاملHardware Modeling in VHDL for Mixed Hardware/Software System Level Co-simulation of Embedded Systems
We present a method for modeling and then simulating a mixed hardware/software embedded system implementation in VHDL starting from a high level design representation. In our approach, a complete system description including the communication interfaces is generated automatically in VHDL: Software is modeled by using behavioral VHDL constructs, annotated with timing information derived from bas...
متن کاملFault Simulation for Hardware Emulation
This paper describes the details of the research completed by the author at the University of Tennessee at Knoxville during the summer of 2016. It mainly focuses on the attempted software design during the program, including application and implementation. While this simulation had not been completed by the end of the program, many significant steps were taken toward completing the software dev...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cryptography
سال: 2021
ISSN: 2410-387X
DOI: 10.3390/cryptography5020015