{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T19:03:43Z","timestamp":1757703823800,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,10,19]],"date-time":"2017-10-19T00:00:00Z","timestamp":1508371200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s41635-017-0020-3","type":"journal-article","created":{"date-parts":[[2017,10,19]],"date-time":"2017-10-19T19:35:26Z","timestamp":1508441726000},"page":"298-310","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Attacks in Reality: the Limits of Concurrent Error Detection Codes Against Laser Fault Injection"],"prefix":"10.1007","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7844-5267","authenticated-orcid":false,"given":"Jakub","family":"Breier","sequence":"first","affiliation":[]},{"given":"Wei","family":"He","sequence":"additional","affiliation":[]},{"given":"Dirmanto","family":"Jap","sequence":"additional","affiliation":[]},{"given":"Shivam","family":"Bhasin","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,19]]},"reference":[{"key":"20_CR1","unstructured":"(2012) Iso\/iec 29192-2:2012, information technology-security techniques-lightweight cryptography-part 2: Block cipher"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal D, Archambeault B, Rao JR, Rohatgi P (2003) The em side-channel (s). In: Cryptographic hardware and embedded systems-CHES 2002. Springer, Berlin, pp 29\u201345","DOI":"10.1007\/3-540-36400-5_4"},{"key":"20_CR3","unstructured":"Anderson MS, North C, Yiu KK (2008) Towards countering the rise of the silicon trojan"},{"issue":"1","key":"20_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-6180-2013-145","volume":"2013","author":"N Bagheri","year":"2013","unstructured":"Bagheri N, Ebrahimpour R, Ghaedi N (2013) New differential fault analysis on present. EURASIP J Adv Signal Process 2013(1):1\u201310","journal-title":"EURASIP J Adv Signal Process"},{"issue":"11","key":"20_CR5","doi-asserted-by":"crossref","first-page":"3056","DOI":"10.1109\/JPROC.2012.2188769","volume":"100","author":"A Barenghi","year":"2012","unstructured":"Barenghi A, Breveglieri L, Koren I, Naccache D (2012) Fault injection attacks on cryptographic devices: theory, practice, and countermeasures. Proc IEEE 100(11):3056\u20133076","journal-title":"Proc IEEE"},{"issue":"4","key":"20_CR6","first-page":"492","volume":"52","author":"G Bertoni","year":"2003","unstructured":"Bertoni G, Breveglieri L, Koren I, Maistri P, Piuri V (2003) Error analysis and detection procedures for a hardware implementation of the advanced encryption standard. IEEE Trans Commun 52(4):492\u2013505","journal-title":"IEEE Trans Commun"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Biham E, Shamir A (1997) Differential fault analysis of secret key cryptosystems. In: Advances in cryptology-CRYPTO\u201997. Springer, Berlin, pp 513\u2013525","DOI":"10.1007\/BFb0052259"},{"key":"20_CR8","volume-title":"PRESENT: an Ultra-lightweight block cipher","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJ, Seurin Y, Vikkelsoe C (2007) PRESENT: an Ultra-lightweight block cipher. Springer, Berlin"},{"issue":"2","key":"20_CR9","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s001450010016","volume":"14","author":"D Boneh","year":"2001","unstructured":"Boneh D, DeMillo RA, Lipton RJ (2001) On the Importance of eliminating errors in cryptographic computations. J Cryptol 14(2):101\u2013119","journal-title":"J Cryptol"},{"key":"20_CR10","doi-asserted-by":"publisher","unstructured":"Breier J, He W (2015) Multiple fault attack on PRESENT with a hardware trojan implementation in FPGA. In: 2015 international workshop on secure internet of things (SIot), pp 58\u201364. https:\/\/doi.org\/10.1109\/SIOT.2015.15","DOI":"10.1109\/SIOT.2015.15"},{"key":"20_CR11","unstructured":"Force T (2005) High performance microchip supply"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Gaisler J (1994) Concurrent error-detection and modular fault-tolerance in a 32-bit processing core for embedded space flight applications. In: Digest of papers., twenty-fourth international symposium on Fault-tolerant computing, 1994. FTCS-24 . IEEE, pp 128\u2013130","DOI":"10.1109\/FTCS.1994.315650"},{"issue":"1","key":"20_CR13","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TIT.1962.1057683","volume":"8","author":"R Gallager","year":"1962","unstructured":"Gallager R (1962) Low-density parity-check codes. IRE Trans Inf Theory 8(1):21\u201328","journal-title":"IRE Trans Inf Theory"},{"key":"20_CR14","first-page":"552","volume":"2012","author":"X Guo","year":"2012","unstructured":"Guo X, Mukhopadhyay D, Karri R (2012) Provably secure concurrent error detection against differential fault analysis. IACR Cryptology ePrint Archive 2012:552","journal-title":"IACR Cryptology ePrint Archive"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"He W, Breier J, Bhasin S, Jap D, Ong HG, Gan CL (2016) Comprehensive laser sensitivity profiling and data register bit-flips for cryptographic fault attacks in 65 nm fpga. In: Carlet C, Hasan MA, Saraswat V (eds) Security, privacy, and applied cryptography engineering: 6th international conference, SPACE 2016, hyderabad, india, december 14-18, 2016, proceedings. Springer International Publishing, Cham, pp 47\u201365","DOI":"10.1007\/978-3-319-49445-6_3"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Joye M, Tunstall M (2012) Fault analysis in cryptography, Springer, Berlin","DOI":"10.1007\/978-3-642-29656-7"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Karpovsky M, Kulikowski KJ, Taubin A (2004) Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard. In: 2004 international conference on dependable systems and networks. IEEE, Piscataway, pp 93\u2013101","DOI":"10.1109\/DSN.2004.1311880"},{"issue":"8","key":"20_CR18","doi-asserted-by":"publisher","first-page":"1818","DOI":"10.1109\/TIT.2004.831844","volume":"50","author":"MG Karpovsky","year":"2004","unstructured":"Karpovsky MG, Taubin A (2004) New class of nonlinear systematic error detecting codes. IEEE Trans Inf Theory 50(8):1818\u20131820. https:\/\/doi.org\/10.1109\/TIT.2004.831844","journal-title":"IEEE Trans Inf Theory"},{"key":"20_CR19","doi-asserted-by":"publisher","unstructured":"Kermani M, Reyhani-Masoleh A (2006) Parity-based fault detection architecture of s-box for advanced encryption standard. In: 21st IEEE international symposium on defect and fault tolerance in VLSI systems, 2006, pp 572\u2013580. DFT \u201906. https:\/\/doi.org\/10.1109\/DFT.2006.50","DOI":"10.1109\/DFT.2006.50"},{"issue":"1","key":"20_CR20","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s13389-011-0006-y","volume":"1","author":"P Kocher","year":"2011","unstructured":"Kocher P, Jaffe J, Jun B, Rohatgi P (2011) Introduction to differential power analysis. J Cryptogr Eng 1(1):5\u201327","journal-title":"J Cryptogr Eng"},{"key":"20_CR21","doi-asserted-by":"publisher","unstructured":"Kulikowski KJ, Karpovsky MG, Taubin A (2006) Fault attack resistant cryptographic hardware with uniform error detection. In: Breveglieri L, Koren I, Naccache D, Seifert J (eds) Fault diagnosis and tolerance in cryptography, third international workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings, Lecture Notes in Computer Science, vol 4236. Springer, Berlin, pp 185\u2013195. https:\/\/doi.org\/10.1007\/11889700_17","DOI":"10.1007\/11889700_17"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Lohrke H, Scholz P, Boit C, Tajik S, Seifert JP (2016) Automated detection of fault sensitive locations for reconfiguration attacks on programmable logic. In: Proceedings of the 42nd international symposium for testing and failure analysis. ASM, pp 1\u20136","DOI":"10.31399\/asm.cp.istfa2016p0336"},{"key":"20_CR23","doi-asserted-by":"publisher","unstructured":"Malkin TG, Standaert FX, Yung M (2006) A comparative cost\/security analysis of fault attack countermeasures. In: Breveglieri L, Koren I, Naccache D, Seifert JP (eds) Fault diagnosis and tolerance in cryptography, lecture notes in computer science, vol 4236. Springer, Berlin, pp 159\u2013172. https:\/\/doi.org\/10.1007\/11889700_15","DOI":"10.1007\/11889700_15"},{"key":"20_CR24","doi-asserted-by":"publisher","unstructured":"Mozaffari-Kermani M, Reyhani-Masoleh A (2008) A lightweight concurrent fault detection scheme for the aes s-boxes using normal basis. In: Oswald E, Rohatgi P (eds) Cryptographic hardware and embedded systems \u2013 CHES 2008, lecture notes in computer science, vol 5154. Springer, Berlin, pp 113\u2013129. https:\/\/doi.org\/10.1007\/978-3-540-85053-3_8","DOI":"10.1007\/978-3-540-85053-3_8"},{"issue":"5","key":"20_CR25","first-page":"608","volume":"59","author":"M Mozaffari-Kermani","year":"2010","unstructured":"Mozaffari-Kermani M, Reyhani-Masoleh A (2010) Concurrent structure-independent fault detection schemes for the advanced encryption standard. IEEE Trans Commun 59(5):608\u2013622","journal-title":"IEEE Trans Commun"},{"issue":"1","key":"20_CR26","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1109\/TVLSI.2009.2031651","volume":"19","author":"M Mozaffari-Kermani","year":"2011","unstructured":"Mozaffari-Kermani M, Reyhani-Masoleh A (2011) A lightweight high-performance fault detection scheme for the advanced encryption standard using composite fields. IEEE Trans Very Large Scale Integr VLSI Syst 19(1):85\u201391","journal-title":"IEEE Trans Very Large Scale Integr VLSI Syst"},{"key":"20_CR27","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/j.procs.2015.09.199","volume":"61","author":"C Perkins","year":"2015","unstructured":"Perkins C, Muller G (2015) Using discrete event simulation to model attacker interactions with cyber and physical security systems. Procedia Comput Sci 61:221\u2013226","journal-title":"Procedia Comput Sci"},{"issue":"1","key":"20_CR28","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MCS.2014.2364708","volume":"35","author":"H Sandberg","year":"2015","unstructured":"Sandberg H, Amin S, Johansson K (2015) Cyberphysical security in networked control systems: an introduction to the issue. IEEE Control Syst 35(1):20\u201323","journal-title":"IEEE Control Syst"},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Schmittner C, Ma Z, Schoitsch E, Gruber T (2015) A case study of fmvea and chassis as safety and security co-analysis method for automotive cyber-physical systems. In: Proceedings of the 1st ACM workshop on cyber-physical system security. ACM, New York , pp 69\u201380","DOI":"10.1145\/2732198.2732204"},{"key":"20_CR30","doi-asserted-by":"crossref","unstructured":"Selmane N, Guilley S, Danger JL (2008) Practical setup time violation attacks on aes. In: Dependable computing conference, 2008. EDCC 2008. Seventh european. IEEE, Piscataway, pp 91\u201396","DOI":"10.1109\/EDCC-7.2008.11"},{"key":"20_CR31","doi-asserted-by":"publisher","unstructured":"Skorobogatov S, Anderson R (2003) Optical fault induction attacks. In: Kaliski B, Ko\u00e7 \u00e7, Paar C (eds) Cryptographic hardware and embedded systems - CHES 2002, lecture notes in computer science, vol 2523. Springer, Berlin, pp 2\u201312. https:\/\/doi.org\/10.1007\/3-540-36400-5_2","DOI":"10.1007\/3-540-36400-5_2"},{"issue":"1","key":"20_CR32","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MDT.2010.20","volume":"27","author":"M Tehranipoor","year":"2010","unstructured":"Tehranipoor M, Koushanfar F (2010) Guest editors\u2019 introduction: confronting the hardware trustworthiness problem. IEEE Des Test Comput 27(1):8\u20139","journal-title":"IEEE Des Test Comput"},{"key":"20_CR33","doi-asserted-by":"crossref","unstructured":"Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection","DOI":"10.1007\/978-3-642-14452-3_7"},{"issue":"5","key":"20_CR34","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1007\/s10836-010-5168-5","volume":"26","author":"Z Wang","year":"2010","unstructured":"Wang Z, Karpovsky M, Kulikowski KJ (2010) Design of memories with concurrent error detection and correction by nonlinear sec-ded codes. J Electron Test 26(5):559\u2013580","journal-title":"J Electron Test"},{"key":"20_CR35","doi-asserted-by":"publisher","unstructured":"Wen L, Jiang W, Jiang K, Zhang X, Pan X, Zhou K (2015) Detecting fault injection attacks on embedded real-time applications: a system-level perspective. In: 2015 IEEE 17th international conference on high performance computing and communications, 2015 IEEE 7th international symposium on cyberspace safety and security, and 2015 IEEE 12th international conference on embedded software and systems, pp 700\u2013705. https:\/\/doi.org\/10.1109\/HPCC-CSS-ICESS.2015.165","DOI":"10.1109\/HPCC-CSS-ICESS.2015.165"},{"key":"20_CR36","doi-asserted-by":"crossref","unstructured":"Wu K, Karri R, Kuznetsov G, Goessel M (2004) Low cost concurrent error detection for the advanced encryption standard. In: Proceedings of the IEEE international test conference (ITC 2004), pp 1242\u20131248","DOI":"10.1109\/TEST.2004.1387397"},{"issue":"4","key":"20_CR37","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1109\/TCAD.2015.2474373","volume":"35","author":"TF Wu","year":"2016","unstructured":"Wu TF, Ganesan K, Hu YA, Wong HP, Wong SS, Mitra S (2016) TPAD: hardware trojan prevention and detection for trusted integrated circuits. IEEE Trans on CAD of Integrated Circuits and Systems 35 (4):521\u2013534. https:\/\/doi.org\/10.1109\/TCAD.2015.2474373","journal-title":"IEEE Trans on CAD of Integrated Circuits and Systems"},{"key":"20_CR38","doi-asserted-by":"crossref","unstructured":"Zhu B, Joseph A, Sastry S (2011) A taxonomy of cyber attacks on scada systems. In: Internet of things (ithings\/CPSCom), 2011 international conference on and 4th international conference on cyber, physical and social computing. IEEE, Piscataway, pp 380\u2013388","DOI":"10.1109\/iThings\/CPSCom.2011.34"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41635-017-0020-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-017-0020-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-017-0020-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T22:17:09Z","timestamp":1659651429000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41635-017-0020-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,19]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["20"],"URL":"https:\/\/doi.org\/10.1007\/s41635-017-0020-3","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"type":"print","value":"2509-3428"},{"type":"electronic","value":"2509-3436"}],"subject":[],"published":{"date-parts":[[2017,10,19]]}}}