{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:50:28Z","timestamp":1766137828392,"version":"3.41.0"},"reference-count":41,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T00:00:00Z","timestamp":1634256000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61574099 and 61974102"],"award-info":[{"award-number":["61574099 and 61974102"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Tianjin Municipal Transportation Science and Technology Development Plan","award":["2017B-40"],"award-info":[{"award-number":["2017B-40"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Des. Autom. Electron. Syst."],"published-print":{"date-parts":[[2022,1,31]]},"abstract":"<jats:p>Fault injection attack (FIA) has become a serious threat to the confidentiality and fault tolerance of integrated circuits (ICs). Circuit designers need an effective method to evaluate the countermeasures of the IC designs against the FIAs at the design stage. To address the need, this article, based on FPGA emulation, proposes an in-circuit early evaluation framework, in which FIAs are emulated with parameterized fault models. To mimic FIAs, an efficient scan approach is proposed to inject faults at any time at any circuit nodes, while both the time and area overhead of fault injection are reduced. After the circuit design under test (CUT) is submitted to the framework, the scan chains insertion, fault generation, and fault injection are executed automatically, and the evaluation result of the CUT is generated, making the evaluation a transparent process to the designers. Based on the framework, the confidentiality and fault-tolerance evaluations are demonstrated with an information-based evaluation approach. Experiment results on a set of ISCAS89 benchmark circuits show that on average, our approach reduces the area overhead by 41.08% compared with the full scan approach and by over 20.00% compared with existing approaches. The confidentiality evaluation experiments on AES-128 and DES-56 and the fault-tolerance evaluation experiments on two CNN circuits, a RISC-V core, a Cordic core, and the float point arithmetic units show the effectiveness of the proposed framework.<\/jats:p>","DOI":"10.1145\/3480962","type":"journal-article","created":{"date-parts":[[2021,10,16]],"date-time":"2021-10-16T00:33:40Z","timestamp":1634344420000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Fault Injection Attack Emulation Framework for Early Evaluation of IC Designs"],"prefix":"10.1145","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1375-0508","authenticated-orcid":false,"given":"Qiang","family":"Liu","sequence":"first","affiliation":[{"name":"Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3142-1812","authenticated-orcid":false,"given":"Honghui","family":"Tang","sequence":"additional","affiliation":[{"name":"Tianjin University, Tianjin, China"}]},{"given":"Peiran","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tianjin University, Tianjin, China"}]}],"member":"320","published-online":{"date-parts":[[2021,10,15]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090208"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/NEWCAS.2013.6573610"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2011.9"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/LATW.2017.7906747"},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the 20th IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA\u201913)","author":"Boit C.","year":"2013","unstructured":"C. Boit , C. Helfmeier , D. Nedospasov , and A. Fox . 2013. Ultra high precision circuit diagnosis through seebeck generation and charge monitoring . In Proceedings of the 20th IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA\u201913) . 17\u201321. DOI:https:\/\/doi.org\/10.1109\/IPFA. 2013 .6599119 C. Boit, C. Helfmeier, D. Nedospasov, and A. Fox. 2013. Ultra high precision circuit diagnosis through seebeck generation and charge monitoring. In Proceedings of the 20th IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA\u201913). 17\u201321. DOI:https:\/\/doi.org\/10.1109\/IPFA.2013.6599119"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2010.5560196"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings (SPACE\u201915)","volume":"9354","author":"Chakraborty Rajat Subhra","year":"2015","unstructured":"Rajat Subhra Chakraborty , Peter Schwabe , and Jon Solworth ( Eds .). 2015 . Security, Privacy, and Applied Cryptography Engineering: 5th International Conference , Proceedings (SPACE\u201915) . Lecture Notes in Computer Science , Vol. 9354 . Springer International Publishing, Cham. DOI:https:\/\/doi.org\/10.1007\/978-3-319-24126-5 Rajat Subhra Chakraborty, Peter Schwabe, and Jon Solworth (Eds.). 2015. Security, Privacy, and Applied Cryptography Engineering: 5th International Conference, Proceedings (SPACE\u201915). Lecture Notes in Computer Science, Vol. 9354. Springer International Publishing, Cham. DOI:https:\/\/doi.org\/10.1007\/978-3-319-24126-5"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00993316"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015079004512"},{"volume-title":"PicoRV32 - A Size-Optimized RISC-V CPU. Retrieved","year":"2019","key":"e_1_2_1_11_1","unstructured":"cliffordwolf. PicoRV32 - A Size-Optimized RISC-V CPU. Retrieved March 3, 2019 , from https:\/\/github.com\/cliffordwolf\/picorv32. cliffordwolf. PicoRV32 - A Size-Optimized RISC-V CPU. Retrieved March 3, 2019, from https:\/\/github.com\/cliffordwolf\/picorv32."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2391773"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2014.6962073"},{"key":"e_1_2_1_14_1","volume-title":"2011 6th International Conference on Design Technology of Integrated Systems in Nanoscale Era (DTIS\u201911)","author":"Dutertre J.","year":"2011","unstructured":"J. Dutertre , J. J. A. Fournier , A. Mirbaha , D. Naccache , J. Rigaud , B. Robisson , and A. Tria . 2011. Review of fault injection mechanisms and consequences on countermeasures design . In 2011 6th International Conference on Design Technology of Integrated Systems in Nanoscale Era (DTIS\u201911) . 1\u20136. DOI:https:\/\/doi.org\/10.1109\/DTIS. 2011 .5941421 J. Dutertre, J. J. A. Fournier, A. Mirbaha, D. Naccache, J. Rigaud, B. Robisson, and A. Tria. 2011. Review of fault injection mechanisms and consequences on countermeasures design. In 2011 6th International Conference on Design Technology of Integrated Systems in Nanoscale Era (DTIS\u201911). 1\u20136. DOI:https:\/\/doi.org\/10.1109\/DTIS.2011.5941421"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED48828.2020.9137051"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2014.15"},{"volume-title":"2017 27th International Conference on Field Programmable Logic and Applications (FPL\u201917)","author":"Gnad Dennis R. E.","key":"e_1_2_1_17_1","unstructured":"Dennis R. E. Gnad , Fabian Oboril , and Mehdi B. Tahoori . 2017. Voltage drop-based fault attacks on FPGAs using valid bitstreams . In 2017 27th International Conference on Field Programmable Logic and Applications (FPL\u201917) . IEEE, 1\u20137. Dennis R. E. Gnad, Fabian Oboril, and Mehdi B. Tahoori. 2017. Voltage drop-based fault attacks on FPGAs using valid bitstreams. In 2017 27th International Conference on Field Programmable Logic and Applications (FPL\u201917). IEEE, 1\u20137."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3462244.3479907"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2011.19"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2010.10"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2007.186"},{"key":"e_1_2_1_22_1","volume-title":"Hacking neural networks: A short introduction. arXiv preprint arXiv:1911.07658","author":"Kissner Michael","year":"2019","unstructured":"Michael Kissner . 2019. Hacking neural networks: A short introduction. arXiv preprint arXiv:1911.07658 ( 2019 ). Michael Kissner. 2019. Hacking neural networks: A short introduction. arXiv preprint arXiv:1911.07658 (2019)."},{"key":"e_1_2_1_23_1","volume-title":"Automation Test in Europe Conference Exhibition (DATE\u201919)","author":"Laurent J.","year":"2019","unstructured":"J. Laurent , V. Beroulle , C. Deleuze , and F. Pebay-Peyroula . 2019. Fault injection on hidden registers in a RISC-V rocket processor and software countermeasures. In 2019 Design , Automation Test in Europe Conference Exhibition (DATE\u201919) . 252\u2013255. DOI:https:\/\/doi.org\/10.23919\/DATE. 2019 .8715158 J. Laurent, V. Beroulle, C. Deleuze, and F. Pebay-Peyroula. 2019. Fault injection on hidden registers in a RISC-V rocket processor and software countermeasures. In 2019 Design, Automation Test in Europe Conference Exhibition (DATE\u201919). 252\u2013255. DOI:https:\/\/doi.org\/10.23919\/DATE.2019.8715158"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.1078"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2010.5724726"},{"volume-title":"2016 IEEE 24th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM\u201916)","author":"Li T.","key":"e_1_2_1_26_1","unstructured":"T. Li and Q. Liu . 2016. Cost effective partial scan for hardware emulation . In 2016 IEEE 24th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM\u201916) . 131\u2013134. T. Li and Q. Liu. 2016. Cost effective partial scan for hardware emulation. In 2016 IEEE 24th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM\u201916). 131\u2013134."},{"key":"e_1_2_1_27_1","first-page":"1109","article-title":"A low cost partial scan approach based on balanced sequential graph transformation","volume":"37","author":"Li T.","year":"2018","unstructured":"T. Li and Q. Liu . 2018 . A low cost partial scan approach based on balanced sequential graph transformation . IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 37 , 5 (2018), 1109 \u2013 1113 . T. Li and Q. Liu. 2018. A low cost partial scan approach based on balanced sequential graph transformation. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 37, 5 (2018), 1109\u20131113.","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"e_1_2_1_28_1","volume-title":"An information theoretic perspective on the differential fault analysis against AES.IACR Cryptology ePrint Archives 2010","author":"Li Yang","year":"2010","unstructured":"Yang Li , Shigeto Gomisawa , Kazuo Sakiyama , and Kazuo Ohta . 2010. An information theoretic perspective on the differential fault analysis against AES.IACR Cryptology ePrint Archives 2010 ( 2010 ), 32. Yang Li, Shigeto Gomisawa, Kazuo Sakiyama, and Kazuo Ohta. 2010. An information theoretic perspective on the differential fault analysis against AES.IACR Cryptology ePrint Archives 2010 (2010), 32."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2944024"},{"volume-title":"2011 12th European Conference on Radiation and Its Effects on Components and Systems. 169\u2013174","author":"Mogollon J. M.","key":"e_1_2_1_30_1","unstructured":"J. M. Mogollon , H. Guzm\u00e1n-Miranda , J. N\u00e1poles , J. Barrientos , and M. A. Aguirre . 2011. FTUNSHADES2: A novel platform for early evaluation of robustness against SEE . In 2011 12th European Conference on Radiation and Its Effects on Components and Systems. 169\u2013174 . J. M. Mogollon, H. Guzm\u00e1n-Miranda, J. N\u00e1poles, J. Barrientos, and M. A. Aguirre. 2011. FTUNSHADES2: A novel platform for early evaluation of robustness against SEE. In 2011 12th European Conference on Radiation and Its Effects on Components and Systems. 169\u2013174."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.9"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2014.39"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2616606.2616859"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_2_1_35_1","volume-title":"VHDLSFI: A simulation-based multi-bit fault injection for dependability analysis. In International eConference on Computer and Knowledge Engineering (ICCKE\u201913)","author":"Pournaghdali F.","year":"2013","unstructured":"F. Pournaghdali , A. Rajabzadeh , and M. Ahmadi . 2013 . VHDLSFI: A simulation-based multi-bit fault injection for dependability analysis. In International eConference on Computer and Knowledge Engineering (ICCKE\u201913) . IEEE , 354\u2013360. DOI:10.1109\/ICCKE.2013.6682846 10.1109\/ICCKE.2013.6682846 F. Pournaghdali, A. Rajabzadeh, and M. Ahmadi. 2013. VHDLSFI: A simulation-based multi-bit fault injection for dependability analysis. In International eConference on Computer and Knowledge Engineering (ICCKE\u201913). IEEE, 354\u2013360. DOI:10.1109\/ICCKE.2013.6682846"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2174984"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2014.6927478"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495583"},{"key":"e_1_2_1_39_1","volume-title":"2016 International Conference on Field-Programmable Technology (FPT\u201916)","author":"Xu Song","year":"2016","unstructured":"Song Xu , Qiang Liu , Tao Li , and Hongxiang Fan . 2016 . IC security evaluation against fault injection attack based on FPGA emulation . In 2016 International Conference on Field-Programmable Technology (FPT\u201916) . 285\u2013288. DOI:https:\/\/doi.org\/10.1109\/FPT.2016.7929554 Song Xu, Qiang Liu, Tao Li, and Hongxiang Fan. 2016. IC security evaluation against fault injection attack based on FPGA emulation. In 2016 International Conference on Field-Programmable Technology (FPT\u201916). 285\u2013288. DOI:https:\/\/doi.org\/10.1109\/FPT.2016.7929554"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/DDECS.2006.1649610"},{"volume-title":"2018 International Conference on Field-Programmable Technology (FPT\u201918)","author":"Xie Y.","key":"e_1_2_1_41_1","unstructured":"Y. Xie , H. Chen , Y. Xie , C. Mao , and B. Li . 2018. An automated FPGA-based fault injection platform for granularly-pipelined fault tolerant CORDIC . In 2018 International Conference on Field-Programmable Technology (FPT\u201918) . 370\u2013373. Y. Xie, H. Chen, Y. Xie, C. Mao, and B. Li. 2018. An automated FPGA-based fault injection platform for granularly-pipelined fault tolerant CORDIC. In 2018 International Conference on Field-Programmable Technology (FPT\u201918). 370\u2013373."}],"container-title":["ACM Transactions on Design Automation of Electronic Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3480962","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3480962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:23Z","timestamp":1750191503000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3480962"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,15]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1,31]]}},"alternative-id":["10.1145\/3480962"],"URL":"https:\/\/doi.org\/10.1145\/3480962","relation":{},"ISSN":["1084-4309","1557-7309"],"issn-type":[{"type":"print","value":"1084-4309"},{"type":"electronic","value":"1557-7309"}],"subject":[],"published":{"date-parts":[[2021,10,15]]},"assertion":[{"value":"2021-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}