You are currently on the new version of our website. Access the old version .

62 Results Found

  • Systematic Review
  • Open Access
44 Citations
10,146 Views
24 Pages

A Systematic Review of Fault Injection Attacks on IoT Systems

  • Aakash Gangolli,
  • Qusay H. Mahmoud and
  • Akramul Azim

The field of the Internet of Things (IoT) is growing at a breakneck pace and its applications are becoming increasingly sophisticated with time. Fault injection attacks on IoT systems are aimed at altering software behavior by introducing faults into...

  • Article
  • Open Access
13 Citations
5,481 Views
10 Pages

2 January 2022

Fault attacks are traditionally considered under a threat model that assumes the device under test is in the possession of the attacker. We propose a variation on this model. In our model, the attacker integrates a fault injection circuit into a mali...

  • Review
  • Open Access
1 Citations
5,617 Views
22 Pages

Countermeasures Against Fault Injection Attacks in Processors: A Review

  • Roua Boulifa,
  • Giorgio Di Natale and
  • Paolo Maistri

5 April 2025

Physical attacks pose a significant threat to the security of embedded processors, which have become an integral part of our daily lives. Processors can be vulnerable to fault injection attacks that threaten their normal and secure behavior. Such att...

  • Article
  • Open Access
2,462 Views
16 Pages

2 March 2020

Fault injection attacks pose a serious threat to many cryptographic devices. The security of most cryptographic devices hinges on a key block called modular division (MD) over a prime field. Although a lot of research has been done to implement the M...

  • Article
  • Open Access
2 Citations
2,321 Views
26 Pages

10 May 2023

This paper investigates an event-triggered framework for addressing fault estimation and fault tolerance issues in discrete-time cyber-physical systems (CPSs) with partial state saturations and random false data injection attacks (FDIAs). A stochasti...

  • Article
  • Open Access
6 Citations
5,356 Views
12 Pages

Novel Fault Injection Attack without Artificial Trigger

  • HanSeop Lim,
  • JongHyeok Lee and
  • Dong-Guk Han

1 June 2020

Theoretical process of fault injection attacks is defined as a process of recovering a secret key assuming that an attacker can inject faults into a specific targeted operation. Therefore, an artificial triggering is required to execute such an attac...

  • Article
  • Open Access
3 Citations
3,578 Views
18 Pages

14 May 2023

A backdoor attack is a type of attack method that induces deep neural network (DNN) misclassification. The adversary who aims to trigger the backdoor attack inputs the image with a specific pattern (the adversarial mark) into the DNN model (backdoor...

  • Article
  • Open Access
6 Citations
2,690 Views
19 Pages

Parity Check Based Fault Detection against Timing Fault Injection Attacks

  • Maoshen Zhang,
  • He Li ,
  • Peijing Wang and
  • Qiang Liu

8 December 2022

Fault injection technologies can be utilized to steal secret information inside integrated circuits (ICs), and thus cause serious information security threats. Parity check has been adopted as an efficient method against fault injection attacks. Howe...

  • Article
  • Open Access
1 Citations
2,113 Views
12 Pages

In this work, the ship relative integrated navigation approaches are studied for the navigation scenarios with the measurements disturbed by unknown statistical property noises and with the injected fault measurement attacks. On the basis of the limi...

  • Article
  • Open Access
3 Citations
3,162 Views
13 Pages

An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults

  • Liang Dong,
  • Hongxin Zhang,
  • Shaofei Sun,
  • Lei Zhu,
  • Xiaotong Cui and
  • Bablu K. Ghosh

1 April 2020

Embedded encryption devices and smart sensors are vulnerable to physical attacks. Due to the continuous shrinking of chip size, laser injection, particle radiation and electromagnetic transient injection are possible methods that introduce transient...

  • Article
  • Open Access
4 Citations
2,588 Views
18 Pages

19 October 2022

A Fault Attack (FA) is performed mainly under the data corruption model and poses a threat to security chips. Instruction corruption can enact the same purpose at the behavioral level, which is produced by interfering with the instruction system. Las...

  • Article
  • Open Access
3 Citations
3,707 Views
17 Pages

15 August 2023

The rapid development of the Internet of Things (IoT) has brought about the processing and storage of sensitive information on resource-constrained devices, which are susceptible to various hardware attacks. Fault injection attacks (FIAs) stand out a...

  • Article
  • Open Access
1 Citations
1,958 Views
18 Pages

Clock Glitch Fault Attacks on Deep Neural Networks and Their Countermeasures

  • Sangwon Lee,
  • Suhyung Kim,
  • Seongwoo Hong and
  • Jaecheol Ha

29 April 2025

Recently, deep neural networks (DNNs) have been widely used in various fields, such as autonomous vehicles and smart homes. Since these DNNs can be directly implemented on edge devices, they offer advantages such as real-time processing in low-power...

  • Review
  • Open Access
1,786 Views
36 Pages

A Framework-Driven Evaluation and Survey of MCU Fault Injection Resilience for IoT

  • Igor Seniushin,
  • Natalya Glazyrina,
  • Yernat Atanbayev,
  • Kamal Bairamov,
  • Yenlik Satiyeva,
  • Olzhas Nurman and
  • Mamyr Altaibek

12 November 2025

With the increasing prevalence of Internet of Things (IoT) devices in areas like authentication, data protection, and access control, general purpose microcontrollers (MCUs) have become the primary platform for security-critical apps. However, the ex...

  • Article
  • Open Access
865 Views
22 Pages

On Power-Off Temperature Attacks Potential Against Security Sensors

  • Maryam Esmaeilian,
  • Vincent Beroulle and
  • David Hély

19 March 2025

Embedded systems can be targeted by fault injection attacks (FIAs), which enable attackers to alter the system specified behavior, potentially gaining access to confidential information or causing unintended outcomes, among other effects. Although nu...

  • Article
  • Open Access
3,420 Views
17 Pages

CONFISCA: An SIMD-Based Concurrent FI and SCA Countermeasure with Switchable Performance and Security Modes

  • Ehsan Aerabi,
  • David Hély,
  • Cyril Bresch,
  • Athanasios Papadimitriou and
  • Mahdi Fazeli

CONFISCA is the first generic SIMD-based software countermeasure that can concurrently resist against Side-Channel Attack (SCA) and Fault Injection (FI). Its promising strength is presented in a PRESENT cipher case study and compared to software-base...

  • Article
  • Open Access
1 Citations
1,123 Views
25 Pages

In this study, to enhance the system reliability under false data injection (FDI) attacks and DC-link voltage (DCLV) sensor failures, a hybrid control strategy for a DC microgrid (DCMG) based on the Lagrange extrapolation and voltage observer is prop...

  • Article
  • Open Access
8 Citations
2,340 Views
18 Pages

Model and Method for Providing Resilience to Resource-Constrained AI-System

  • Viacheslav Moskalenko,
  • Vyacheslav Kharchenko and
  • Serhii Semenov

13 September 2024

Artificial intelligence technologies are becoming increasingly prevalent in resource-constrained, safety-critical embedded systems. Numerous methods exist to enhance the resilience of AI systems against disruptive influences. However, when resources...

  • Review
  • Open Access
14 Citations
8,536 Views
27 Pages

The Internet-of-Things (IoT) has gained significant importance in all aspects of daily life, and there are many areas of application for it. Despite the rate of expansion and the development of infrastructure, such systems also bring new concerns and...

  • Review
  • Open Access
35 Citations
10,522 Views
44 Pages

Resilience and Resilient Systems of Artificial Intelligence: Taxonomy, Models and Methods

  • Viacheslav Moskalenko,
  • Vyacheslav Kharchenko,
  • Alona Moskalenko and
  • Borys Kuzikov

18 March 2023

Artificial intelligence systems are increasingly being used in industrial applications, security and military contexts, disaster response complexes, policing and justice practices, finance, and healthcare systems. However, disruptions to these system...

  • Article
  • Open Access
6 Citations
3,781 Views
24 Pages

Model and Training Method of the Resilient Image Classifier Considering Faults, Concept Drift, and Adversarial Attacks

  • Viacheslav Moskalenko,
  • Vyacheslav Kharchenko,
  • Alona Moskalenko and
  • Sergey Petrov

19 October 2022

Modern trainable image recognition models are vulnerable to different types of perturbations; hence, the development of resilient intelligent algorithms for safety-critical applications remains a relevant concern to reduce the impact of perturbation...

  • Article
  • Open Access
2 Citations
2,443 Views
18 Pages

An ASCON AOP-SystemC Environment for Security Fault Analysis

  • Hassen Mestiri,
  • Imen Barraj,
  • Mouna Bedoui and
  • Mohsen Machhout

14 March 2024

Cryptographic devices’ complexity necessitates fast security simulation environments against fault attacks. SystemC, a promising candidate in Electronic System Levels (ESLs), can achieve higher simulation speeds while maintaining accuracy and r...

  • Article
  • Open Access
6 Citations
6,820 Views
17 Pages

Reset Tree-Based Optical Fault Detection

  • Dong-Geon Lee,
  • Dooho Choi,
  • Jungtaek Seo and
  • Howon Kim

21 May 2013

In this paper, we present a new reset tree-based scheme to protect cryptographic hardware against optical fault injection attacks. As one of the most powerful invasive attacks on cryptographic hardware, optical fault attacks cause semiconductors to m...

  • Article
  • Open Access
2,617 Views
19 Pages

Experimental FIA Methodology Using Clock and Control Signal Modifications under Power Supply and Temperature Variations

  • Francisco Eugenio Potestad-Ordóñez,
  • Erica Tena-Sánchez,
  • José Miguel Mora-Gutiérrez,
  • Manuel Valencia-Barrero and
  • Carlos Jesús Jiménez-Fernández

16 November 2021

The security of cryptocircuits is determined not only for their mathematical formulation, but for their physical implementation. The so-called fault injection attacks, where an attacker inserts faults during the operation of the cipher to obtain a ma...

  • Article
  • Open Access
7 Citations
2,596 Views
15 Pages

Protecting FPGA-Based Cryptohardware Implementations from Fault Attacks Using ADCs

  • Francisco Eugenio Potestad-Ordóñez,
  • Alejandro Casado-Galán and
  • Erica Tena-Sánchez

29 February 2024

The majority of data exchanged between connected devices are confidential and must be protected against unauthorized access. To ensure data protection, so-called cryptographic algorithms are used. These algorithms have proven to be mathematically sec...

  • Article
  • Open Access
1 Citations
3,680 Views
22 Pages

A differential fault attack framework for the Enocoro family of stream ciphers is presented. We only require that the attacker can reset the internal state and inject a random byte-fault, in a random register, during a known time period. For a single...

  • Review
  • Open Access
13 Citations
4,985 Views
20 Pages

Hardware Countermeasures Benchmarking against Fault Attacks

  • Francisco Eugenio Potestad-Ordóñez,
  • Erica Tena-Sánchez,
  • Antonio José Acosta-Jiménez,
  • Carlos Jesús Jiménez-Fernández and
  • Ricardo Chaves

26 February 2022

The development of differential fault analysis (DFA) techniques and mechanisms to inject faults into cryptographic circuits brings with it the need to use protection mechanisms that guarantee the expected level of security. The AES cipher, as a stand...

  • Article
  • Open Access
13 Citations
2,765 Views
15 Pages

27 May 2023

The hash function KECCAK integrity algorithm is implemented in cryptographic systems to provide high security for any circuit requiring integrity and protect the transmitted data. Fault attacks, which can extricate confidential data, are one of the m...

  • Article
  • Open Access
2 Citations
1,908 Views
17 Pages

Efficient Attack Scheme against SKINNY-64 Based on Algebraic Fault Analysis

  • Xing Fang,
  • Hongxin Zhang,
  • Xiaotong Cui,
  • Yuanzhen Wang and
  • Linxi Ding

7 June 2023

Lightweight block ciphers are normally used in low-power resource-constrained environments, while providing reliable and sufficient security. Therefore, it is important to study the security and reliability of lightweight block ciphers. SKINNY is a n...

  • Article
  • Open Access
4 Citations
2,290 Views
20 Pages

22 May 2023

This paper investigated the co-design problem of less conservative integrated security control and communication for a nonlinear cyber-physical system (CPS) with an actuator fault and false data injection (FDI) attacks. Firstly, considering the effic...

  • Article
  • Open Access
9 Citations
6,923 Views
25 Pages

Fault injection simulation on embedded software is typically captured using a high-level fault model that expresses fault behavior in terms of programmer-observable quantities. These fault models hide the true sensitivity of the underlying processor...

  • Article
  • Open Access
1 Citations
1,680 Views
36 Pages

A Vulnerable-by-Design IoT Sensor Framework for Cybersecurity in Smart Agriculture

  • Emil Marian Pasca,
  • Daniela Delinschi,
  • Rudolf Erdei,
  • Iulia Baraian and
  • Oliviu Dorin Matei

Agricultural Internet of Things (IoT) deployments face unique cybersecurity challenges due to resource constraints and direct impact on food production. This paper introduces a vulnerable-by-design, containerized IoT framework simulating both cyberse...

  • Communication
  • Open Access
6 Citations
7,526 Views
9 Pages

19 October 2021

Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on. Thus, the security of their hardware implementations is an im...

  • Article
  • Open Access
10 Citations
3,723 Views
19 Pages

In this paper, a general event-triggered framework is constructed to investigate the problem of remote fault detection for stochastic cyber-physical systems subject to the additive disturbances, sensor nonlinearities and deception attacks. Both fault...

  • Article
  • Open Access
3 Citations
3,963 Views
15 Pages

A Countermeasure against DPA on SIMON with an Area-Efficient Structure

  • Yuanyuan Zhang,
  • Ning Wu,
  • Fang Zhou,
  • Jinbao Zhang and
  • Muhammad Rehan Yahya

Differential power analysis (DPA) is an effective side channel attack method, which poses a critical threat to cryptographic algorithms, especially lightweight ciphers such as SIMON. In this paper, we propose an area-efficient countermeasure against...

  • Article
  • Open Access
1 Citations
3,943 Views
25 Pages

Locking-Enabled Security Analysis of Cryptographic Circuits

  • Devanshi Upadhyaya,
  • Maël Gay and
  • Ilia Polian

Hardware implementations of cryptographic primitives require protection against physical attacks and supply chain threats. This raises the question of secure composability of different attack countermeasures, i.e., whether protecting a circuit agains...

  • Article
  • Open Access
5 Citations
1,706 Views
14 Pages

26 June 2023

The collusive false data injection attack (CFDIA) is a false data injection attack (FIDA), in which false data are injected in a coordinated manner into some adjacent pairs of captured nodes of an attacked wireless sensor network (WSN). As a result,...

  • Article
  • Open Access
894 Views
17 Pages

Multidimensional Fault Injection and Simulation Analysis for Random Number Generators

  • Xianli Xie,
  • Jiansheng Chen,
  • Jiajun Zhou,
  • Ruiqing Zhai and
  • Xianzhao Xia

18 September 2025

Random number generators play a critical role in ensuring information security, supporting encrypted communications, and preventing data leakage. However, the random number generators widely used in hardware are faced with potential threats such as e...

  • Article
  • Open Access
2 Citations
1,354 Views
21 Pages

2 September 2025

Distributed target tracking in multi-agent networks plays a critical role in cooperative sensing and autonomous navigation. However, it faces significant challenges in highly dynamic and adversarial setups. This study aims to enhance the resilience o...

  • Article
  • Open Access
1 Citations
1,528 Views
17 Pages

Generalized Code-Abiding Countermeasure

  • Pierre-Antoine Tissot,
  • Lilian Bossuet and
  • Vincent Grosso

15 February 2023

The widely used countermeasures against fault attacks are based on spatial, temporal, or information redundancy. This type of solution is very efficient, but it can be very expensive in terms of implementation cost. Thus, trying to propose a secure a...

  • Article
  • Open Access
13 Citations
3,604 Views
19 Pages

Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA

  • Francisco Eugenio Potestad-Ordóñez,
  • Manuel Valencia-Barrero,
  • Carmen Baena-Oliva,
  • Pilar Parra-Fernández and
  • Carlos Jesús Jiménez-Fernández

3 December 2020

One of the best methods to improve the security of cryptographic systems used to exchange sensitive information is to attack them to find their vulnerabilities and to strengthen them in subsequent designs. Trivium stream cipher is one of the lightwei...

  • Article
  • Open Access
2 Citations
1,852 Views
23 Pages

2 July 2024

Fault data injection attacks may lead to a decrease in system performance and even a malfunction in system operation for an automatic feedback control system, which has motive to develop an effective method for rapidly detecting such attacks so that...

  • Article
  • Open Access
4 Citations
2,128 Views
13 Pages

Meet-in-the-Middle Differential Fault Analysis on ITUbee Block Cipher

  • Yongze Kang,
  • Qingyuan Yu,
  • Lingyue Qin and
  • Guoyan Zhang

2 June 2023

Differential fault analysis (DFA) was introduced by Biham and Shamir. It is a powerful analysis technique to retrieve the secret key by injecting fault into an internal state and utilizing the differences between the correct ciphertexts and the fault...

  • Feature Paper
  • Article
  • Open Access
15 Citations
4,142 Views
15 Pages

Intelligent electronic devices (IEDs) along with advanced information and communication technology (ICT)-based networks are emerging in the legacy power grid to obtain real-time system states and provide the energy management system (EMS) with wide-a...

  • Article
  • Open Access
4 Citations
2,339 Views
27 Pages

6 August 2022

The widespread application of phasor measurement units has improved grid operational reliability. However, this has increased the risk of cyber threats such as false data injection attack that mislead time-critical measurements, which may lead to inc...

  • Article
  • Open Access
15 Citations
3,745 Views
24 Pages

A Comprehensive Case Study of Data-Driven Methods for Robust Aircraft Sensor Fault Isolation

  • Nicholas Cartocci,
  • Marcello R. Napolitano,
  • Gabriele Costante and
  • Mario L. Fravolini

26 February 2021

Recent catastrophic events in aviation have shown that current fault diagnosis schemes may not be enough to ensure a reliable and prompt sensor fault diagnosis. This paper describes a comparative analysis of consolidated data-driven sensor Fault Isol...

  • Article
  • Open Access
641 Views
21 Pages

Horizontal Attack Against EC kP Accelerator Under Laser Illumination

  • Dmytro Petryk,
  • Ievgen Kabin,
  • Peter Langendoerfer and
  • Zoya Dyka

Devices employing cryptographic approaches have to be resistant to physical attacks. Side-Channel Analysis (SCA) and Fault Injection (FI) attacks are frequently used to reveal cryptographic keys. In this paper, we present a combined SCA and laser ill...

  • Article
  • Open Access
43 Citations
13,268 Views
15 Pages

Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT) and Operational Technology (OT) systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are graduall...

  • Article
  • Open Access
2 Citations
2,534 Views
15 Pages

Optimized Parameter Search Approach for Weight Modification Attack Targeting Deep Learning Models

  • Xabier Echeberria-Barrio,
  • Amaia Gil-Lerchundi,
  • Raul Orduna-Urrutia and
  • Iñigo Mendialdua

7 April 2022

Deep neural network models have been developed in different fields, bringing many advances in several tasks. However, they have also started to be incorporated into tasks with critical risks. That worries researchers who have been interested in study...

  • Article
  • Open Access
1,127 Views
28 Pages

IoT-Enabled Fog-Based Secure Aggregation in Smart Grids Supporting Data Analytics

  • Hayat Mohammad Khan,
  • Farhana Jabeen,
  • Abid Khan,
  • Muhammad Waqar and
  • Ajung Kim

8 October 2025

The Internet of Things (IoT) has transformed multiple industries, providing significant potential for automation, efficiency, and enhanced decision-making. The incorporation of IoT and data analytics in smart grid represents a groundbreaking opportun...

of 2