Reset Tree-Based Optical Fault Detection

被引:4
|
作者
Lee, Dong-Geon [1 ]
Choi, Dooho [2 ]
Seo, Jungtaek [3 ]
Kim, Howon [1 ]
机构
[1] Pusan Natl Univ, Dept Comp Engn, Pusan 609735, South Korea
[2] Elect & Telecommun Res Inst ETRI, Taejon 305700, South Korea
[3] ETRI, Attached Inst, Taejon 305811, South Korea
来源
SENSORS | 2013年 / 13卷 / 05期
关键词
optical fault; single event transient; soft-error; reset tree; fault detection;
D O I
10.3390/s130506713
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In this paper, we present a new reset tree-based scheme to protect cryptographic hardware against optical fault injection attacks. As one of the most powerful invasive attacks on cryptographic hardware, optical fault attacks cause semiconductors to misbehave by injecting high-energy light into a decapped integrated circuit. The contaminated result from the affected chip is then used to reveal secret information, such as a key, from the cryptographic hardware. Since the advent of such attacks, various countermeasures have been proposed. Although most of these countermeasures are strong, there is still the possibility of attack. In this paper, we present a novel optical fault detection scheme that utilizes the buffers on a circuits reset signal tree as a fault detection sensor. To evaluate our proposal, we model radiation-induced currents into circuit components and perform a SPICE simulation. The proposed scheme is expected to be used as a supplemental security tool.
引用
收藏
页码:6713 / 6729
页数:17
相关论文
共 50 条
  • [41] Optimal Byzantine Attacks on Distributed Detection in Tree-based Topologies
    Kailkhura, Bhavya
    Brahma, Swastik
    Varshney, Pramod K.
    2013 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2013,
  • [42] Sensor fault detection, diagnosis, and data reconstruction strategy for chiller based on an improved tree-based pipeline optimization tool framework
    Wu, Pinguo
    Hu, Yunpeng
    Li, Guannan
    Liu, Qi
    Xiong, Chenglong
    Deng, Jiahui
    Chen, Shiao
    INTERNATIONAL JOURNAL OF REFRIGERATION, 2025, 174 : 60 - 75
  • [43] DECKARD: Scalable and accurate tree-based detection of code clones
    Jiang, Lingxiao
    Misherghi, Ghassan
    Su, Zhendong
    Glondu, Stephane
    ICSE 2007: 29TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2007, : 96 - +
  • [44] A weighted decision tree-based fast intrusion detection model
    Tian, Jun-feng
    Guo, Huai-yu
    Ma, Guo-fu
    IC-BNMT 2007: PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2007, : 115 - 120
  • [45] INTELLIGENT TREE-BASED ENSEMBLE APPROACHES FOR PHISHING WEBSITE DETECTION
    Alsariera, Yazan A.
    Balogun, Abdullateef O.
    Adeyemo, Victor E.
    Tarawneh, Omar H.
    Mojeed, Hammed A.
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2022, 17 (01): : 563 - 582
  • [46] An Intelligent Tree-Based Intrusion Detection Model for Cyber Security
    Al-Omari, Mohammad
    Rawashdeh, Majdi
    Qutaishat, Fadi
    Alshira'H, Mohammad
    Ababneh, Nedal
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2021, 29 (02)
  • [47] Tree-based Intelligent Intrusion Detection System in Internet of Vehicles
    Yang, Li
    Moubayed, Abdallah
    Hamieh, Ismail
    Shami, Abdallah
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [48] STREAMRHF: Tree-Based Unsupervised Anomaly Detection for Data Streams
    Nesic, Stefan
    Putina, Andrian
    Bahri, Maroua
    Huet, Alexis
    Navarro, Jose Manuel
    Rossi, Dario
    Sozio, Mauro
    2022 IEEE/ACS 19TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2022,
  • [49] Graph Partitioning Change Detection Using Tree-Based Clustering
    Sato, Sho-ichi
    Yamanishi, Kenji
    2013 IEEE 13TH INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2013, : 1169 - 1174
  • [50] A parse tree-based NoSQL injection attacks detection mechanism
    Wu, Tsu-Yang (wutsuyang@gmail.com), 2017, Ubiquitous International (08):