نتایج جستجو برای: fault injection

تعداد نتایج: 219704  

Journal: :IACR Cryptology ePrint Archive 2012
Amine Dehbaoui Jean-Max Dutertre Bruno Robisson P. Orsatelli Philippe Maurine Assia Tria

This article considers the use of magnetic pulses to inject transient faults into the calculations of a RISC micro-controller running the AES algorithm. A magnetic coil is used to generate the pulses. It induces computational faults without any physical contact with the device. The injected faults are proved to be constant (i.e. data independent) under certain experimental conditions. This beha...

2006
Dawid Trawczynski Janusz Sosnowski Janusz Zalewski

This article presents a study on efficient dependability evaluation via fault injection using an extension of the True Time network simulator. The experimental results were obtained for checking and comparing fault tolerant aspects of CAN and TTCAN safety critical network interfaces.

1996
Uwe Wildner

--Due to the overall increase in computer performance software-implemented fault injection (SWIFI) techniques are becoming increasingly attractive. Not only the easyness of use but also the quality of the injected faults contribute to the successful application of SWIFI based tools in the field. SWIFLER is a tool for UNIX systems for sofware-implemented injection of control flow errors. Its pur...

2015
Vyacheslav Kharchenko Oleksandr Gordieiev Sergiy Vilkomir Oleg Odarushchenko

One well-known method for the verification and certification of NPP I&C and other safety critical systems is the fault injection technique (FIT). FIT is based on a design fault injection and vulnerability injection into the software code and the field-programmable gate array (FPGA) design or a physical fault injection into hardware modules. The requirements for FIT for safety critical applicati...

2004
Luping Chen John H. R. May

The difficulties to assess reliability of systems that use COTS components are sometimes compounded by the inaccessibility of some COTS codes. This paper develops an approach of Perturbation of Interface Parameters (PIP) to simulate failures of COTS components. It is to validate the use of PIP as a fault-injection technique to test COTS components and surrounding systems. Tests of a nuclear pro...

1995
Timothy K. Tsai Ravishankar K. Iyer

This paper describes FTAPE (Fault Tolerance And Performance Eval-uator), a tool that can be used to compare fault-tolerant computers. The major parts of the tool include a system-wide fault injector, a workload generator, and a workload activity measurement tool. The workload creates high stress conditions on the machine. Using stress-based injection, the fault injector is able to utilize knowl...

2010
Lukasz Juszczyk Schahram Dustdar

In this demo paper we present the prototype of our fault injection testbed generator. Our tool empowers engineers to generate emulated SOA environments and to program fault injection behavior on diverse levels: at the network layer, at the execution level, and at the message layer. Engineers can specify the structure of testbeds via scripts, attach fault models, and generate running testbed ins...

Journal: :IEICE Electronic Express 2011
Masahiro Kaminaga Arimitsu Shikoda Hideki Yoshikawa

Recently, various studies of attack methods of round reduction differential fault analysis (DFA) using fault injection in block cipher-implemented microcontrollers have been reported. However, few studies have focused on the quantitative evaluation method of round reduction DFA vulnerability using detailed fault injection timing dependency of attack success rate. This is required to improve mic...

1997
Mario Dal Cin Wolfgang Hohl Volkmar Sieh

To provide a computing system to be dependable fault tolerance mechanisms have to be included. Especially massive parallelism represents a new challenge for fault tolerance. In this paper we discuss basic hardware fault tolerance measures for massively parallel multiprocessors and solutions realized for and integrated into different multiprocessor architectures. Further we present our validatio...

2008
Christophe Clavier Benedikt Gierlichs Ingrid Verbauwhede

We present a study of several fault attacks against the block cipher IDEA. Such a study is particularly interesting because of the target cipher’s specific property to employ operations on three different algebraic groups while not using substitution tables. We observe that the attacks perform very different in terms of efficiency. Although requiring a restrictive fault model, the first attack ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید