3 research outputs found

    A Comprehensive Survey on Non-Invasive Fault Injection Attacks

    Get PDF
    Non-invasive fault injection attacks have emerged as significant threats to a spectrum of microelectronic systems ranging from commodity devices to high-end customized processors. Unlike their invasive counterparts, these attacks are more affordable and can exploit system vulnerabilities without altering the hardware physically. Furthermore, certain non-invasive fault injection strategies allow for remote vulnerability exploitation without the requirement of physical proximity. However, existing studies lack extensive investigation into these attacks across diverse target platforms, threat models, emerging attack strategies, assessment frameworks, and mitigation approaches. In this paper, we provide a comprehensive overview of contemporary research on non-invasive fault injection attacks. Our objective is to consolidate and scrutinize the various techniques, methodologies, target systems susceptible to the attacks, and existing mitigation mechanisms advanced by the research community. Besides, we categorize attack strategies based on several aspects, present a detailed comparison among the categories, and highlight research challenges with future direction. By underlining and discussing the landscape of cutting-edge, non-invasive fault injection, we hope more researchers, designers, and security professionals examine the attacks further and take such threats into consideration while developing effective countermeasures

    Design & Implementation of a Low Cost Data Logger for Solar Home System

    Get PDF
    The demand of electric power is increasing gradually with the advancement of modern technology & engineering. Because the demand of electricity in urban areas or in industrial zones is large in amount & also more important than the rural areas, there exists a shortage of electric power supply facilities for rural households or remote location from the cities. In this case, Solar Energy is a promising solution to meet the demand for electricity services of rural areas in developing countries like Bangladesh. The effectiveness & stability of small PV systems for rural development is needed to be monitored for successful installment of Solar Panel. In order to analyze the system & modify it for cost reduction a data capturing unit should be constructed that can store the voltages & currents at three different terminals. A microcontroller operated Smart Data Logger can perform this work with high accuracy & precision maintaining the system cost much less than the conventional system. This paper deals with the design and implementation of a low cost data logger for solar home system. An experimental set up is designed and implemented and the paper illustrates the working principle, data observation and analysis, limitations, and future aspects of a low cost data logger for solar home system

    Secure Physical Design

    Get PDF
    An integrated circuit is subject to a number of attacks including information leakage, side-channel attacks, fault-injection, malicious change, reverse engineering, and piracy. Majority of these attacks take advantage of physical placement and routing of cells and interconnects. Several measures have already been proposed to deal with security issues of the high level functional design and logic synthesis. However, to ensure end-to-end trustworthy IC design flow, it is necessary to have security sign-off during physical design flow. This paper presents a secure physical design roadmap to enable end-to-end trustworthy IC design flow. The paper also discusses utilization of AI/ML to establish security at the layout level. Major research challenges in obtaining a secure physical design are also discussed
    corecore