, can be divided for instance because of decimator stage, the second reason is that the random value is often stored in flip-flop and those elements are known to be easy to fault. Therefore, if EMFI platforms become fast enough to strongly bias TRNG output
An EM fault injection susceptibility criterion and its application to the localization of hotspots, Smart Card Research and Advanced Applications -16th International Conference, pp.180-195, 2017. ,
the impact of pulsed electromagnetic fault injection on true random number generators, Workshop on Fault Diagnosis and Tolerance in Cryptography, 2018. ,
,
Control-flow integrity principles, implementations, and applications, ACM Trans. Inf. Syst. Secur, vol.13, issue.1, 2009. ,
A code morphing methodology to automate power analysis countermeasures, 2012. ,
Akaike's information criterion, International Encyclopedia of Statistical Science, p.25, 2011. ,
Can code polymorphism limit information leakage? In Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication -5th IFIP WG 11.2 International Workshop, WISTP, pp.1-21, 2011. ,
Anvil: Software-based protection against nextgeneration rowhammer attacks, vol.04, p.2016 ,
Design and validation of a platform for electromagnetic fault injection, 2017 32nd Conference on Design of Circuits and Integrated Systems (DCIS), pp.1-6, 2017. ,
Theory and practice of a leakage resilient masking scheme, Advances in Cryptology -ASIACRYPT 2012 -18th International Conference on the Theory and Application of Cryptology and Information Security, pp.758-775, 2012. ,
Countermeasures against fault attacks on software implemented AES: effectiveness and cost, Proceedings of the 5th Workshop on Embedded Systems Security, WESS 2010, p.7, 2010. ,
Compilation of a countermeasure against instruction-skip fault attacks, Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, pp.1-6, 2016. ,
URL : https://hal.archives-ouvertes.fr/cea-01296572
Fault analysis of infective AES computations, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.101-107, 2013. ,
Contactless electromagnetic active attack on ring oscillator based true random number generator, COSADE, pp.151-166, 2012. ,
URL : https://hal.archives-ouvertes.fr/ujm-00699618
Contactless electromagnetic active attack on ring oscillator based true random number generator, Constructive Side-Channel Analysis and Secure Design, pp.151-166, 2012. ,
URL : https://hal.archives-ouvertes.fr/ujm-00699618
An architecture-independent instruction shuffler to protect against side-channel attacks ,
, ACM Trans. Archit. Code Optim, vol.8, issue.4, 2012.
Error analysis and detection procedures for a hardware implementation of the advanced encryption standard, IEEE Trans. Computers, vol.52, issue.4, pp.492-505, 2003. ,
NICV: normalized inter-class variance for detection of side-channel leakage, IACR Cryptology ePrint Archive, p.717, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-02412040
Curious case of rowhammer: Flipping secret exponent bits using timing analysis, Cryptographic Hardware and Embedded Systems -CHES 2016 -18th International Conference, pp.602-624, 2016. ,
Can't touch this: Software-only mitigation against rowhammer attacks targeting kernel memory, 26th USENIX Security Symposium (USENIX Security 17), pp.117-130, 2017. ,
An electromagnetic fault injection sensor using hogge phase-detector, 2017 18th International Symposium on Quality Electronic Design (ISQED), pp.307-312, 2017. ,
Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology -CRYPTO '99, vol.1666, pp.398-412, 1999. ,
CAMFAS: A compiler approach to mitigate fault attacks via enhanced simdization, IACR Cryptology ePrint Archive, p.1083, 2017. ,
Cattmew : Defeating software-only physical kernel isolation, 2019. ,
Electromagnetic analysis, deciphering and reverse engineering of integrated circuits (e-mata hari), 22nd International Conference on Very Large Scale Integration (VLSI-SoC), pp.1-6, 2014. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01434592
Secret external encodings do not prevent transient fault analysis, Cryptographic Hardware and Embedded Systems -CHES 2007, 9th International Workshop, pp.181-194, 2007. ,
Exploiting correcting codes : On the effectiveness of ecc memory against rowhammer attacks, 2018. ,
COGITO: code polymorphism to secure devices, SECRYPT 2014 -Proceedings of the 11th International Conference on Security and Cryptography, pp.451-456, 2014. ,
BADFET: Defeating modern secure boot using secondorder pulsed electromagnetic fault injection, 11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017. ,
Electromagnetic transient faults injection on a hardware and a software implementations of aes, FDTC, pp.7-15, 2012. ,
URL : https://hal.archives-ouvertes.fr/emse-00742639
Enhancing electromagnetic analysis using magnitude squared incoherence, IEEE Trans. VLSI Syst, vol.20, issue.3, pp.573-577, 2012. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00761786
Enhancing electromagnetic attacks using spectral coherence based cartography, vol.10, pp.135-155, 2009. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00429342
Electromagnetic glitch on the AES round counter, Constructive Side-Channel Analysis and Secure Design -4th International Workshop, COSADE 2013, pp.17-31, 2013. ,
URL : https://hal.archives-ouvertes.fr/emse-00837514
Collision based attacks in practice, Euromicro Conference on Digital System Design, pp.367-374, 2015. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01269809
Sifa: Exploiting ineffective fault inductions on symmetric cryptography, IACR Transactions on Cryptographic Hardware and Embedded Systems, vol.2018, issue.3, pp.547-572, 2018. ,
An embedded digital sensor against EM and BB fault injection, Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016, pp.78-86, 2016. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01434028
Infective computation and dummy rounds: Fault protection for block ciphers without check-beforeoutput, Progress in Cryptology -LATINCRYPT 2012 -2nd International Conference on Cryptology and Information Security in Latin America, pp.305-321, 2012. ,
DFA on AES, Advanced Encryption Standard -AES, 4th International Conference, pp.27-41, 2004. ,
DES and Differential Power Analysis (The "Duplication" Method), Cryptographic Hardware and Embedded Systems -CHES'99, vol.1717, pp.158-172, 1999. ,
Another flip in the wall of rowhammer defenses, 2018 IEEE Symposium on Security and Privacy, pp.245-261, 2018. ,
Rowhammer.js: A remote software-induced fault attack in javascript, Detection of Intrusions and Malware, and Vulnerability Assessment -13th International Conference, DIMVA 2016, pp.300-321, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01872588
FPGA intrinsic pufs and their use for IP protection, Cryptographic Hardware and Embedded Systems -CHES 2007, 9th International Workshop, pp.63-80, 2007. ,
Analysis of intel's ivy bridge digital random number generator prepared for intel by, vol.04, 2019. ,
Random number generation based on oscillatory metastability in ring circuits, IACR Cryptology ePrint Archive, p.637, 2011. ,
EM attack is non-invasive? -design methodology and validity verification of EM attack sensor, Cryptographic Hardware and Embedded Systems -CHES 2014 -16th International Workshop, pp.1-16, 2014. ,
MASCAT: stopping microarchitectural attacks before execution, IACR Cryptology ePrint Archive, p.1196, 2016. ,
Optical and em fault-attacks on crt-based rsa: Concrete results, Proceedings of the 15th Austrian Workhop on Microelectronics, 2007. ,
Parity-based concurrent error detection of substitution-permutation network block ciphers, pp.113-124, 2003. ,
Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors, ACM/IEEE 41st International Symposium on Computer Architecture, pp.361-372, 2014. ,
Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems, CRYPTO '96: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, pp.104-113, 1996. ,
Thwarting fault attacks against lightweight cryptography using SIMD instructions, IEEE International Symposium on Circuits and Systems, pp.1-5, 2018. ,
URL : https://hal.archives-ouvertes.fr/cea-01746138
Electromagnetic activity vs. logical activity: Near field scans for reverse engineering, Smart Card Research and Advanced Applications, 17th International Conference, pp.140-155, 2018. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01943151
Software countermeasures for control flow integrity of smart card C codes, Computer Security -ESORICS 2014 -19th European Symposium on Research in Computer Security, pp.200-218, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01059201
Nethammer: Inducing rowhammer faults through network requests, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01872588
On the need of randomness in fault attack countermeasures -application to AES, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.85-94, 2012. ,
the impact of pulsed electromagnetic fault injection on true random number generators, Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC, 2018. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01943112
An EM fault injection susceptibility criterion and its application to the localization of hotspots, Smart Card Research and Advanced Applications -16th International Conference, pp.180-195, 2017. ,
URL : https://hal.archives-ouvertes.fr/lirmm-02100194
Double-data-rate computation as a countermeasure against fault analysis, IEEE Trans. Computers, vol.57, issue.11, pp.1528-1539, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-00348325
A novel double-data-rate AES architecture resistant against fault injection, Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.54-61, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00181356
The frequency injection attack on ring-oscillator-based true random number generators, Cryptographic Hardware and Embedded Systems -CHES 2009, pp.317-331, 2009. ,
The frequency injection attack on ringoscillator-based true random number generators, Cryptographic Hardware and Embedded Systems -CHES 2009, 11th International Workshop, pp.317-331, 2009. ,
Techniques for em fault injection: Equipments and experimental results, pp.3-4, 2012. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00761778
Pll to the rescue: a novel em fault countermeasure, pp.1-6, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-02288461
Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller, 2014. ,
URL : https://hal.archives-ouvertes.fr/emse-00871218
Formal verification of a software countermeasure against instruction skip attacks ,
URL : https://hal.archives-ouvertes.fr/emse-00869509
, J. Cryptographic Engineering, vol.4, issue.3, pp.145-156, 2014.
Experimenting with faults, lattices and the DSA, IACR Cryptology ePrint Archive, p.277, 2004. ,
Spice (simulation program with integrated circuit emphasis), 1973. ,
The insecurity of the digital signature algorithm with partially known nonces, J. Cryptology, vol.15, issue.3, pp.151-176, 2002. ,
The insecurity of the elliptic curve digital signature algorithm with partially known nonces, Des. Codes Cryptography, vol.30, issue.2, pp.201-217, 2003. ,
Magnetic microprobe design for em fault attack, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01893856
Near-field electromagnetic imagery at millimeter waves and microwave near-field injection, Systèmes (Montpellier), vol.12, p.2015 ,
URL : https://hal.archives-ouvertes.fr/tel-01496503
Magnetic microprobe design for em fault attack, vol.01, p.2013 ,
URL : https://hal.archives-ouvertes.fr/hal-01893856
EM injection: Fault model and locality, Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2015, pp.3-13, 2015. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01319078
Master's thesis, École Doctorale Information, Structures, Systèmes (Montpellier), vol.11, p.2015 ,
Experiments and root cause analysis for active-precharge hammering fault in ddr3 sdram under 3x nm technology, Microelectronics Reliability, vol.57, pp.39-46, 2016. ,
Fault tolerant infective countermeasure for AES, Security, Privacy, and Applied Cryptography Engineering -5th International Conference, pp.190-209, 2015. ,
Fault injection with a new flavor: Memetic algorithms make a difference, Constructive Side-Channel Analysis and Secure Design -6th International Workshop, pp.159-173, 2015. ,
A differential fault attack technique against SPN structures, with application to the AES and KHAZAD, Cryptographic Hardware and Embedded Systems -CHES 2003, 5th International Workshop, pp.77-88, 2003. ,
Local and direct em injection of power into cmos integrated circuits, FDTC, pp.100-104, 2011. ,
A new approach for rowhammer attacks, 2016 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016, pp.161-166, 2016. ,
Eddy current for magnetic analysis with active sensor, Proceedings of ESmart, pp.185-194, 2002. ,
Enhancing correlation electromagnetic attack using planar near-field cartography, Design, Automation and Test in Europe, pp.628-633, 2009. ,
Blind cartography for side channel attacks: Cross-correlation cartography ,
, Int. J. Reconfig. Comp, vol.360242, issue.9, pp.1-360242, 2012.
Blind cartography for side channel attacks: Cross-correlation cartography ,
, Int. J. Reconfig. Comp, vol.360242, issue.9, pp.1-360242, 2012.
Leakage assessment methodology -A clear roadmap for side-channel evaluations, Cryptographic Hardware and Embedded Systems -CHES 2015 -17th International Workshop, pp.495-513, 2015. ,
A provably secure true random number generator with built-in tolerance to active attacks, IEEE Transactions on Computers, vol.56, issue.1, pp.109-119, 2007. ,
Throwhammer: Rowhammer attacks over the network and defenses, 2018 USENIX Annual Technical Conference, USENIX ATC 2018, pp.213-226, 2018. ,
Data integrity in hardware for modular arithmetic, Cryptographic Hardware and Embedded Systems -CHES 2000, Second International Workshop, pp.204-215, 2000. ,
Continuous signature monitoring: efficient concurrentdetection of processor control errors, International Test Conference 1988 Proceeding New Frontiers in Testing, pp.914-925, 1988. ,
Simple error detection methods for hardware implementation of advanced encryption standard, IEEE Trans. Computers, vol.55, issue.6, pp.720-731, 2006. ,
Efficiency of a glitch detector against electromagnetic fault injection, DATE, pp.1-6, 2014. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01096047
Efficiency of a glitch detector against electromagnetic fault injection, DATE: Design, Automation and Test in Europe, Design, Automation and Test in Europe Conference and Exhibition (DATE), pp.1-6, 2014. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01096047