Sciweavers

408 search results - page 23 / 82
» Statistical Fault Injection
Sort
View
FDTC
2010
Springer
124views Cryptology» more  FDTC 2010»
13 years 5 months ago
Optical Fault Masking Attacks
This paper introduces some new types of optical fault attacks called fault masking attacks. These attacks are aimed at disrupting of the normal memory operation through preventing ...
Sergei Skorobogatov
CHES
2011
Springer
271views Cryptology» more  CHES 2011»
12 years 7 months ago
Modulus Fault Attacks against RSA-CRT Signatures
RSA-CRT fault attacks have been an active research area since their discovery by Boneh, DeMillo and Lipton in 1997. We present alternative key-recovery attacks on RSA-CRT signature...
Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi...
DATE
2000
IEEE
117views Hardware» more  DATE 2000»
14 years 1 days ago
Evaluating System Dependability in a Co-Design Framework
The widespread adoption of embedded microprocessor-based systems for safety critical applications mandates the use of co-design tools able to evaluate system dependability at ever...
Marcello Lajolo, Maurizio Rebaudengo, Matteo Sonza...
DFT
2000
IEEE
119views VLSI» more  DFT 2000»
14 years 1 days ago
An Experimental Evaluation of the Effectiveness of Automatic Rule-Based Transformations for Safety-Critical Applications
1 Over the last years, an increasing number of safety-critical tasks have been demanded to computer systems. In particular, safety-critical computer-based applications are hitting ...
Maurizio Rebaudengo, Matteo Sonza Reorda, Marco To...
DSN
2000
IEEE
14 years 1 days ago
Testing for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Wenliang Du, Aditya P. Mathur