{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:04:47Z","timestamp":1772906687322,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s41635-017-0016-z","type":"journal-article","created":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T15:57:01Z","timestamp":1504281421000},"page":"237-251","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Extensive Laser Fault Injection Profiling of 65 nm FPGA"],"prefix":"10.1007","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7844-5267","authenticated-orcid":false,"given":"Jakub","family":"Breier","sequence":"first","affiliation":[]},{"given":"Wei","family":"He","sequence":"additional","affiliation":[]},{"given":"Shivam","family":"Bhasin","sequence":"additional","affiliation":[]},{"given":"Dirmanto","family":"Jap","sequence":"additional","affiliation":[]},{"given":"Samuel","family":"Chef","sequence":"additional","affiliation":[]},{"given":"Hock Guan","family":"Ong","sequence":"additional","affiliation":[]},{"given":"Chee Lip","family":"Gan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,1]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Agoyan M, Dutertre JM, Mirbaha AP, Naccache D, Ribotta AL, Tria A (2010) Single-bit DFA using multiple-byte laser fault injection. In: 2010 IEEE international conference on HST, pp 113\u2013119","DOI":"10.1109\/THS.2010.5655079"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Alderighi M, Casini F, d\u2019Angelo S, Mancini M, Pastore S, Sechi GR (2007) Evaluation of single event upset mitigation schemes for sram based FPGAs using the FLIPPER fault injection platform. In: 22nd IEEE international symposium on defect and fault-tolerance in VLSI systems, 2007. DFT\u201907. pp 105\u2013113. IEEE","DOI":"10.1109\/DFT.2007.45"},{"key":"16_CR3","unstructured":"Anderson R (2001) Security engineering: a guide to building dependable distributed systems"},{"issue":"1","key":"16_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-6180-2013-145","volume":"2013","author":"N Bagheri","year":"2013","unstructured":"Bagheri N, Ebrahimpour R, Ghaedi N (2013) New differential fault analysis on PRESENT. EURASIP J Advances Signal Process 2013(1):1\u201310","journal-title":"EURASIP J Advances Signal Process"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Bagheri N, Ghaedi N, Sanadhya SK (2015) Differential fault analysis of SHA-3. In: Progress in cryptology\u2013INDOCRYPT 2015, pp 253\u2013269. Springer","DOI":"10.1007\/978-3-319-26617-6_14"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Beutler J (2015) Visible light lvp on bulk silicon devices. In: 41st international symposium for testing and failure analysis (November 1-5, 2015), pp 1\u20138. Asm","DOI":"10.31399\/asm.cp.istfa2015p0006"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Biham E, Shamir A (1997) Differential fault analysis of secret key cryptosystems. In: Advances in cryptology-CRYPTO\u201997, pp 513\u2013525. Springer","DOI":"10.1007\/BFb0052259"},{"key":"16_CR8","doi-asserted-by":"publisher","unstructured":"Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJB, Seurin Y, Vikkelsoe C (2007) Present: An ultra-lightweight block cipher. In: Paillier P, Verbauwhede I (eds) Cryptographic hardware and embedded systems - CHES 2007: 9th international workshop, Vienna, Austria, September 10-13, 2007. Proceedings, pp 450\u2013466. Springer Berlin Heidelberg, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-540-74735-2_31","DOI":"10.1007\/978-3-540-74735-2_31"},{"issue":"2","key":"16_CR9","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s001450010016","volume":"14","author":"D Boneh","year":"2001","unstructured":"Boneh D, DeMillo RA, Lipton RJ (2001) On the importance of eliminating errors in cryptographic computations. J Cryptol 14(2):101\u2013119","journal-title":"J Cryptol"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Breier J, Jap D (2015) Testing feasibility of back-side laser fault injection on a microcontroller. In: Proceedings of the WESS\u201915, pp 5:1\u20135:6","DOI":"10.1145\/2818362.2818367"},{"issue":"3","key":"16_CR11","doi-asserted-by":"publisher","first-page":"1852","DOI":"10.1109\/TNS.2013.2255312","volume":"60","author":"S Buchner","year":"2013","unstructured":"Buchner S, Miller F, Pouget V, McMorrow D (2013) Pulsed-laser testing for single-event effect investigations. IEEE Trans Nucl Sci 60(3):1852\u20131875","journal-title":"IEEE Trans Nucl Sci"},{"issue":"2","key":"16_CR12","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s00145-010-9083-9","volume":"24","author":"G Canivet","year":"2011","unstructured":"Canivet G, Maistri P, Leveugle R, Cldire J, Valette F, Renaudin M (2011) Glitch and laser fault attacks onto a secure AES implementation on a SRAM-based FPGA. J Cryptol 24(2):247\u2013268","journal-title":"J Cryptol"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Courbon F, Loubet-Moundi P, Fournier JJ, Tria A (2014) Adjusting laser injections for fully controlled faults. In: International workshop on constructive side-channel analysis and secure design, pp 229\u2013242. Springer","DOI":"10.1007\/978-3-319-10175-0_16"},{"key":"16_CR14","unstructured":"Courtois NT, Jackson K, Ware D (2010) Fault-algebraic attacks on inner rounds of des. In: e-Smart\u201910 proceedings: the future of digital security technologies"},{"key":"16_CR15","unstructured":"Dutertre JM, Mirbaha AP, Naccache D, Tria A (2010) Reproducible single-byte laser fault injection. In: 2010 conference on PRIME, pp 1\u20134"},{"key":"16_CR16","doi-asserted-by":"publisher","unstructured":"He W, Breier J, Bhasin S (2016) Cheap and cheerful: a low-cost digital sensor for detecting laser fault injection attacks. In: Security, privacy, and applied cryptography engineering - 6th international conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings, pp 27\u201346. https:\/\/doi.org\/10.1007\/978-3-319-49445-6_2","DOI":"10.1007\/978-3-319-49445-6_2"},{"issue":"8","key":"16_CR17","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1016\/j.micpro.2014.02.005","volume":"38","author":"W He","year":"2014","unstructured":"He W, Otero A, de la Torre E, Riesgo T (2014) Customized and automated routing repair toolset towards side-channel analysis resistant dual rail logic. Microprocess Microsyst 38(8):899\u2013910","journal-title":"Microprocess Microsyst"},{"key":"16_CR18","first-page":"388","volume":"99","author":"PC Kocher","year":"1999","unstructured":"Kocher PC, Jaffe J, Jun B (1999) Differential power analysis. CRYPTO 99:388\u2013397","journal-title":"CRYPTO"},{"key":"16_CR19","first-page":"9","volume":"99","author":"O K\u00f6mmerling","year":"1999","unstructured":"K\u00f6mmerling O, Kuhn MG (1999) Design principles for tamper-resistant smartcard processors. Smartcard 99:9\u201320","journal-title":"Smartcard"},{"issue":"6","key":"16_CR20","doi-asserted-by":"publisher","first-page":"3130","DOI":"10.1109\/TNS.2014.2369008","volume":"61","author":"F Lima Kastensmidt","year":"2014","unstructured":"Lima Kastensmidt F, Tambara L, Bobrovsky DV, Pechenkin AA, Nikiforov AY (2014) Laser testing methodology for diagnosing diverse soft errors in a nanoscale sram-based fpga. IEEE Trans Nucl Sci 61(6):3130\u20133137","journal-title":"IEEE Trans Nucl Sci"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Lohrke H, Scholz P, Boit C, Tajik S, Seifert JP (2016) Automated detection of fault sensitive locations for reconfiguration attacks on programmable logic, pp 1\u20136","DOI":"10.31399\/asm.cp.istfa2016p0336"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Maurine P (2012) Techniques for em fault injection: equipments and experimental results. In: 2012 workshop on fault diagnosis and tolerance in cryptography (FDTC), pp 3\u20134. IEEE","DOI":"10.1109\/FDTC.2012.21"},{"key":"16_CR23","doi-asserted-by":"publisher","unstructured":"Merli D, Schuster D, Stumpf F, Sigl G (2011) Semi-invasive em attack on fpga ro pufs and countermeasures. In: Proceedings of the workshop on embedded systems security, WESS \u201911, pp 2:1\u20132:9. ACM, New York, NY, USA. https:\/\/doi.org\/10.1145\/2072274.2072276","DOI":"10.1145\/2072274.2072276"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Moradi A, Immler V (2014) Early propagation and imbalanced routing, how to diminish in fpgas. In: Cryptographic hardware and embedded systems\u2013CHES 2014, pp 598\u2013615. Springer","DOI":"10.1007\/978-3-662-44709-3_33"},{"key":"16_CR25","doi-asserted-by":"publisher","unstructured":"Phang J, Chan D, Palaniappan M, Chin J, Davis B, Bruce M, Wilcox J, Gilfeather G, Chua C, Koh L, Ng H, Tan S (2004) A review of laser induced techniques for microelectronic failure analysis. In: Proceedings of the 11th international symposium on the physical and failure analysis of integrated circuits. IPFA 2004, pp 255\u2013261. https:\/\/doi.org\/10.1109\/IPFA.2004.1345617","DOI":"10.1109\/IPFA.2004.1345617"},{"key":"16_CR26","unstructured":"Pouget V, Douin A, Lewis D, Fouillat P, Foucard G, Peronnard P, Maingot V, Ferron J, Anghel L, Leveugle R, Velazco R (2007) Tools and methodology development for pulsed laser fault injection in SRAM-based FPGAs. In: 8th LATW\u201907), p. Session 8. IEEE Computer Society, Cuzco, Peru"},{"key":"16_CR27","unstructured":"Quisquater JJ, Samyde D (2002) Eddy current for magnetic analysis with active sensor. In: Esmart 2002, Nice, France"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Roscian C, Dutertre JM, Tria A (2013) Frontside laser fault injection on cryptosystems - Application to the AES\u2019 last round. In: 2013 IEEE international symposium on HOST, pp 119\u2013124","DOI":"10.1109\/HST.2013.6581576"},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Roscian C, Sarafianos A, Dutertre JM, Tria A (2013) Fault model analysis of laser-induced faults in SRAM memory cells. In: 2013 workshop on FDTC, pp 89\u201398","DOI":"10.1109\/FDTC.2013.17"},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"Selmane N, Bhasin S, Guilley S, Graba T, Danger JL (2009) WDDL is protected against setup time violation attacks. In: FDTC, pp 73\u201383","DOI":"10.1109\/FDTC.2009.40"},{"key":"16_CR31","unstructured":"Selmke B, Brummer S, Heyszl J, Sigl G (2015) Precise laser fault injections into 90nm and 45nm SRAM-cells. In: CARDIS, pp 1\u201313"},{"issue":"99","key":"16_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TC.2016.2646367","volume":"PP","author":"P Swierczynski","year":"2017","unstructured":"Swierczynski P, Becker GT, Moradi A, Paar C (2017) Bitstream fault injections (bifi)\u2014automated fault attacks against sram-based fpgas. IEEE Trans Comput PP(99):1\u201314. https:\/\/doi.org\/10.1109\/TC.2016.2646367","journal-title":"IEEE Trans Comput"},{"key":"16_CR33","doi-asserted-by":"publisher","unstructured":"Tajik S, Lohrke H, Ganji F, Seifert JP, Boit C (2015) Laser fault attack on physically unclonable functions. In: 2015 workshop on fault diagnosis and tolerance in cryptography (FDTC), pp 85\u201396. https:\/\/doi.org\/10.1109\/FDTC.2015.19","DOI":"10.1109\/FDTC.2015.19"},{"key":"16_CR34","doi-asserted-by":"crossref","unstructured":"Tunstall M, Mukhopadhyay D, Ali S (2011) Differential fault analysis of the advanced encryption standard using a single fault. In: 5th IFIP WG, WISTP, pp 224\u2013233","DOI":"10.1007\/978-3-642-21040-2_15"},{"key":"16_CR35","doi-asserted-by":"crossref","unstructured":"Wu K, Karri R, Kuznetsov G, Goessel M (2004) Low cost concurrent error detection for the advanced encryption standard. In: Test conference, 2004. Proceedings. ITC 2004. International, pp 1242\u20131248. IEEE","DOI":"10.1109\/TEST.2004.1387397"},{"issue":"5","key":"16_CR36","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1109\/TIFS.2016.2516905","volume":"11","author":"F Zhang","year":"2016","unstructured":"Zhang F, Guo S, Zhao X, Wang T, Yang J, Standaert FX, Gu D (2016) A framework for the analysis and evaluation of algebraic fault attacks on lightweight block ciphers. IEEE Trans Inf Forensics Secur 11(5):1039\u20131054. https:\/\/doi.org\/10.1109\/TIFS.2016.2516905","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41635-017-0016-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-017-0016-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-017-0016-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T02:35:33Z","timestamp":1659407733000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41635-017-0016-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["16"],"URL":"https:\/\/doi.org\/10.1007\/s41635-017-0016-z","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"value":"2509-3428","type":"print"},{"value":"2509-3436","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9]]},"assertion":[{"value":"10 April 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}