메뉴 건너뛰기




Volumn 6225 LNCS, Issue , 2010, Pages 158-172

Flash memory 'bumping' attacks

Author keywords

Fault injection; Optical probing; Semi invasive attacks

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; EMBEDDED SYSTEMS; HARDWARE SECURITY; NETWORK SECURITY; SOFTWARE TESTING;

EID: 78049325204     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15031-9_11     Document Type: Conference Paper
Times cited : (46)

References (17)
  • 1
    • 78049342167 scopus 로고    scopus 로고
    • Xilinx CoolRunner-II CPLDs in Secure Applications. White Paper
    • Xilinx CoolRunner-II CPLDs in Secure Applications. White Paper, http://www.xilinx.com/support/documentation/white-papers/wp170.pdf
  • 2
    • 78049347179 scopus 로고    scopus 로고
    • Design Security in Nonvolatile Flash and Antifuse FPGAs. Security Backgrounder
    • Design Security in Nonvolatile Flash and Antifuse FPGAs. Security Backgrounder, http://www.actel.com/documents/DesignSecurity-WP.pdf
  • 3
    • 27244445173 scopus 로고    scopus 로고
    • Semi-invasive attacks-a new approach to hardware security analysis
    • University of Cambridge, Computer Laboratory April
    • Skorobogatov, S.: Semi-invasive attacks-A new approach to hardware security analysis. Technical Report UCAM-CL-TR-630, University of Cambridge, Computer Laboratory (April 2005), http://www.cl.cam.ac.uk/techreports/UCAM-CL- TR-630.pdf
    • (2005) Technical Report UCAM-CL-TR-630
    • Skorobogatov, S.1
  • 4
    • 35248813476 scopus 로고    scopus 로고
    • Optical fault induction attacks
    • Kaliski Jr., B. S., Koç, Ç. K., Paar, C. eds., Springer, Heidelberg
    • Skorobogatov, S., Anderson, R.: Optical Fault Induction Attacks. In: Kaliski Jr., B. S., Koç, Ç. K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 2-12. Springer, Heidelberg (2003)
    • (2003) CHES 2002. LNCS , vol.2523 , pp. 2-12
    • Skorobogatov, S.1    Anderson, R.2
  • 8
    • 78049332309 scopus 로고    scopus 로고
    • Opening locks by bumping in five seconds or less: Is it really a threat to physical security?
    • Investigative Law Offices
    • Tobias, M. W.: Opening locks by bumping in five seconds or less: is it really a threat to physical security? A technical analysis of the issues, Investigative Law Offices, http://podcasts.aolcdn.com/engadget/videos/lockdown/ bumping-040206.pdf
    • A Technical Analysis of the Issues
    • Tobias, M.W.1
  • 9
    • 78049348859 scopus 로고    scopus 로고
    • NEC PD789104A, 789114A, 789124A, 789134A Subseries User's Manual. 8-Bit Single-Chip Microcontrollers
    • NEC PD789104A, 789114A, 789124A, 789134A Subseries User's Manual. 8-Bit Single-Chip Microcontrollers, http://www2.renesas.com/maps-download/pdf/ U13037EJ1V0PM00.pdf
  • 10
    • 78049345092 scopus 로고    scopus 로고
    • NEC 78K/0, 78K/0S Series 8-Bit Single-Chip Microcontrollers. Flash Memory Write. Application Note
    • NEC 78K/0, 78K/0S Series 8-Bit Single-Chip Microcontrollers. Flash Memory Write. Application Note, http://www.necel.com/nesdis/image/U14458EJ1V0AN00.pdf
  • 11
    • 78049331844 scopus 로고    scopus 로고
    • ProASIC3 Flash Family FPGAs
    • Actel ProASIC3 Handbook. ProASIC3 Flash Family FPGAs, http://www.actel.com/documents/PA3-HB.pdf
    • Actel ProASIC3 Handbook
  • 12
    • 78049344442 scopus 로고    scopus 로고
    • Actel: ISP and STAPL. Application Note AC171
    • Actel: ISP and STAPL. Application Note AC171, http://www.actel.com/ documents/ISP-STAPL-AN.pdf
  • 13
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Wiener, M. ed, Springer, Heidelberg
    • Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) CRYPTO 1999. LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 14
    • 31344466635 scopus 로고
    • Two new imaging techniques promise to improve IC defect identification
    • Ajluni, C.: Two new imaging techniques promise to improve IC defect identification. Electronic Design 43(14), 37-38 (1995)
    • (1995) Electronic Design , vol.43 , Issue.14 , pp. 37-38
    • Ajluni, C.1
  • 15
    • 24144434064 scopus 로고    scopus 로고
    • DFA on AES
    • Dobbertin, H., Rijmen, V., Sowa, A. eds., Springer, Heidelberg
    • Giraud, C.: DFA on AES. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2004. LNCS, vol. 3373, pp. 27-41. Springer, Heidelberg (2005)
    • (2005) AES 2004. LNCS , vol.3373 , pp. 27-41
    • Giraud, C.1
  • 16
    • 78049339160 scopus 로고    scopus 로고
    • Actel ProASIC3/E Production FPGAs. Features and Advantages
    • Actel ProASIC3/E Production FPGAs. Features and Advantages, http://www.actel.com/documents/PA3-E-Tech-WP.pdf
  • 17
    • 77950998751 scopus 로고    scopus 로고
    • Using optical emission analysis for estimating contribution to power analysis
    • Lausanne, Switzerland, September 2009, IEEE-CS Press, los Alamitos, ISBN 978-0-7695-3824-2
    • Skorobogatov, S.: Using Optical Emission Analysis for Estimating Contribution to Power Analysis. In: 6th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2009), Lausanne, Switzerland, September 2009, pp. 111-119. IEEE-CS Press, los Alamitos (2009) ISBN 978-0-7695-3824-2
    • (2009) 6th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2009) , pp. 111-119
    • Skorobogatov, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.