{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:41:12Z","timestamp":1761324072720,"version":"3.41.0"},"reference-count":28,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T00:00:00Z","timestamp":1478044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61003032"],"award-info":[{"award-number":["61003032"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Research Fund of National Key Laboratory of Computer Architecture","award":["CARCH201501"],"award-info":[{"award-number":["CARCH201501"]}]},{"name":"Open Project Program of the State Key Laboratory of Mathematical Engineering and Advanced Computing","award":["2016A09"],"award-info":[{"award-number":["2016A09"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Emerg. Technol. Comput. Syst."],"published-print":{"date-parts":[[2017,4,30]]},"abstract":"<jats:p>Fault injection attack has been a serious threat to security-critical embedded systems for a long time, yet existing research ignores addressing of the problem from a system-level perspective. This article presents an approach to the synthesis of secure real-time applications mapped on distributed embedded systems, which focuses on preventing fault injection attacks of the security protection on processing units. We utilize symmetric cryptographic service to protect confidentiality and deploy fault detection within a confidential algorithm to resist fault injection attacks. Several fault detection schemes are identified, and their fault coverage rates and time overheads are derived and measured. Our synthesis approach makes efforts to determine the best fault detection schemes for the encryption\/decryption of messages such that the overall security strength of detecting a fault injection attack is maximized and the deadline constraint of the real-time applications is guaranteed. Due to the complexity of the problem, we propose an efficient algorithm based on the fruit fly optimization algorithm, and we compare it to the simulated annealing approach. Extensive experiments and a real-life application evaluation demonstrate the superiority of our approach.<\/jats:p>","DOI":"10.1145\/2967611","type":"journal-article","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T12:49:04Z","timestamp":1478263744000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["System-Level Design to Detect Fault Injection Attacks on Embedded Real-Time Applications"],"prefix":"10.1145","volume":"13","author":[{"given":"Wei","family":"Jiang","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China"}]},{"given":"Liang","family":"Wen","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China"}]},{"given":"Ke","family":"Jiang","sequence":"additional","affiliation":[{"name":"\u00c5F-Technology AB, Sweden"}]},{"given":"Xia","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas"}]},{"given":"Xiong","family":"Pan","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China"}]},{"given":"Keran","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China"}]}],"member":"320","published-online":{"date-parts":[[2016,11,2]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024812"},{"volume-title":"Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems. 51--59","author":"Bertoni G.","key":"e_1_2_1_2_1","unstructured":"G. Bertoni , L. Breveglieri , I. Koren , P. Maistri , and V. Piuri . 2002. A parity code based on concurrent fault detection for implementations of the Advanced Encryption Standard . In Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems. 51--59 . G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, and V. Piuri. 2002. A parity code based on concurrent fault detection for implementations of the Advanced Encryption Standard. In Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems. 51--59."},{"key":"e_1_2_1_3_1","volume-title":"CRT: Concrete results and practical countermeasures. In Cryptographic Hardware and Embedded Systems\u2014CHES","author":"Bier P.","year":"2002","unstructured":"P. Bier , W. Fischer , and P. Hofreiter . 2002 . Fault attacks on RSA with CRT: Concrete results and practical countermeasures. In Cryptographic Hardware and Embedded Systems\u2014CHES 2002. Lecture Notes in Computer Science, Vol. 2523 . Springer , 260--275. http:\/\/citeseer.nj.nec.com\/525626.html. P. Bier, W. Fischer, and P. Hofreiter. 2002. Fault attacks on RSA with CRT: Concrete results and practical countermeasures. In Cryptographic Hardware and Embedded Systems\u2014CHES 2002. Lecture Notes in Computer Science, Vol. 2523. Springer, 260--275. http:\/\/citeseer.nj.nec.com\/525626.html."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/151116"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_15"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45126-6_12"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.226"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010016"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/92.894152"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.50"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228398"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.51"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2345770.2345773"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/DDECS.2011.5783087"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2492708.2492945"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45238-6_10"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/996566.996771"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.16792"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2561828.2561852"},{"volume-title":"Proceedings of the Conference on Design, Automation, and Test in Europe (DATE\u201911)","author":"Ma K.","key":"e_1_2_1_20_1","unstructured":"K. Ma and K. Wu . 2011. LOEDAR: A low cost error detection and recovery scheme for ECC . In Proceedings of the Conference on Design, Automation, and Test in Europe (DATE\u201911) . 1--6. K. Ma and K. Wu. 2011. LOEDAR: A low cost error detection and recovery scheme for ECC. In Proceedings of the Conference on Design, Automation, and Test in Europe (DATE\u201911). 1--6."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2755753.2755816"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2011.07.001"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-2873-1"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160298"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2485288.2485398"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998582.1998621"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.165"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656045.2656049"}],"container-title":["ACM Journal on Emerging Technologies in Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2967611","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2967611","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:49:58Z","timestamp":1750218598000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2967611"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,2]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,4,30]]}},"alternative-id":["10.1145\/2967611"],"URL":"https:\/\/doi.org\/10.1145\/2967611","relation":{},"ISSN":["1550-4832","1550-4840"],"issn-type":[{"type":"print","value":"1550-4832"},{"type":"electronic","value":"1550-4840"}],"subject":[],"published":{"date-parts":[[2016,11,2]]},"assertion":[{"value":"2016-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}