Skip to main content

Showing 1–3 of 3 results for author: Schellenberg, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2105.13769  [pdf, other

    cs.CR

    ARMORY: Fully Automated and Exhaustive Fault Simulation on ARM-M Binaries

    Authors: Max Hoffmann, Falk Schellenberg, Christof Paar

    Abstract: Embedded systems are ubiquitous. However, physical access of users and likewise attackers makes them often threatened by fault attacks: a single fault during the computation of a cryptographic primitive can lead to a total loss of system security. This can have serious consequences, e.g., in safetycritical systems, including bodily harm and catastrophic technical failures. However, countermeasures… ▽ More

    Submitted 28 May, 2021; originally announced May 2021.

  2. SPFA: SFA on Multiple Persistent Faults

    Authors: Susanne Engels, Falk Schellenberg, Christof Paar

    Abstract: For classical fault analysis, a transient fault is required to be injected during runtime, e.g., only at a specific round. Instead, Persistent Fault Analysis (PFA) introduces a powerful class of fault attacks that allows for a fault to be present throughout the whole execution. One limitation of original PFA as introduced by Zhang et al. at CHES'18 is that the faulty values need to be known to the… ▽ More

    Submitted 28 May, 2021; originally announced May 2021.

  3. arXiv:1802.08916  [pdf, other

    cs.CR

    SAT-based Reverse Engineering of Gate-Level Schematics using Fault Injection and Probing

    Authors: Shahrzad Keshavarz, Falk Schellenberg, Bastian Richter, Christof Paar, Daniel Holcomb

    Abstract: Gate camouflaging is a known security enhancement technique that tries to thwart reverse engineering by hiding the functions of gates or the connections between them. A number of works on SAT-based attacks have shown that it is often possible to reverse engineer a circuit function by combining a camouflaged circuit model and the ability to have oracle access to the obfuscated combinational circuit… ▽ More

    Submitted 24 February, 2018; originally announced February 2018.

    Comments: IEEE International Symposium on Hardware Oriented Security and Trust (HOST)