This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Power Analysis and Fault Attacks against Secure CAN: How Safe Are Your Keys?
Journal Article
11-01-01-0001
ISSN: 2572-1046, e-ISSN: 2572-1054
Sector:
Topic:
Citation:
O’Flynn, C. and d’Eon, G., "Power Analysis and Fault Attacks against Secure CAN: How Safe Are Your Keys?," SAE Int. J. Transp. Cyber. & Privacy 1(1):3-18, 2018, https://doi.org/10.4271/11-01-01-0001.
Language:
English
References
- Miller , C. and Valasek , C. 2015
- Greenberg , A. Hackers Remotely Kill a Jeep on the Highway-With Me in It Wired 7 21 2015
- International Organization for Standardization 2015
- Jain , S. and Guajardo , J. Physical Layer Group Key Agreement for Automotive Controller Area Networks Workshop on Cryptographic Hardware and Embedded Systems (CHES) Santa Barbara 85 105 2016
- International Organization for Standardization 2013
- Scott , M. The Face Whisperer for USB Glitching PoC||GTFO 13 30 37 2016
- Kocher , P. , Jaffe , J. , and Jun , B. Differential Power Analysis Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology Santa Barbara 388 397 1999
- Brier , E. , Clavier , C. , and Olivier , F. Correlation Power Analysis with a Leakage Model Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES) Boston 16 29 2004
- Oswald , E. , Mangard , S. , and Popp , T. Power Analysis Attacks: Revealing the Secrets of Smart Cards, New York Springer 2007 978-0-387-30857-9
- Genkin , D. , Pipman , I. , and Tromer , E. Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs International Workshop on Cryptographic Hardware and Embedded Systems (CHES) Busan, Korea 242 260 2014
- Balasch , J. , Gierlichs , B. , Reparaz , O. , and Verbauwhede , I. 2015
- O’Flynn , C. and Zhizhang , C. ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research COSADE Paris, France 2014
- Ronen , E. , O’Flynn , C. , Shamir , A. , and Weingarten , A.O. IoT Goes Nuclear: Creating a ZigBee Chain Reaction IEEE Symposium on Security and Privacy (SP) San Jose 195 212 2017
- Oswald , D. , Richter , B. , and Paar , C. Side-Channel Attacks on the Yubikey 2 One-Time Password Generator International Workshop on Recent Advances in Intrusion Detection (RAID) St. Lucia 204 222 2013
- Moradi , A. and Schneider , T. Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE) Graz, Austria 71 87 2016
- Moradi , A. , Oswald , D. , Paar , C. , and Swierczynski , P. Side-Channel Attacks on the Bitstream Encryption Mechanism of Altera Stratix II: Facilitating Black-Box Analysis Using Software Reverse-Engineering Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays Monterey 91 100 2013
- Skorobogatov , S. and Woods , C. 2012
- Paar , C. , Eisenbarth , T. , Kasper , M. , Kasper , T. et al. KeeLoq and Side-Channel Analysis-Evolution of an Attack Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) Lausanne, Switzerland 2009
- Jaffe , J. A First-Order DPA Attack against AES in Counter Mode with Unknown Initial Counter Workshop on Cryptographic Hardware and Embedded Systems (CHES) Vienna, Austria 1 13 2007
- National Institute of Advanced Industrial Science and Technology (AIST) 2010
- Agrawal , D. , Rao , J. , and Rohatgi , P. Multi-Channel Attacks Workshop on Cryptographic Hardware and Embedded Systems (CHES) Cologne, Germany 2003
- Zussa , L. , Dutertre , J.M. , Clediere , J. , and Robisson , B. Analysis of the Fault Injection Mechanism Related to Negative and Positive Power Supply Glitches Using an On-Chip Voltmeter Symposium on Hardware-Oriented Security and Trust (HOST) Arlington 2014
- Carpi , R. , Picek , S. , Batina , L. , Menarini , F. et al. Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection Smart Card Research and Advanced Applications (CARDIS) Paris, France 2014
- Veredas , R.P. and Wiersma , N. Safety != Security. A Security Assessment of State of the Art ASIL-D Certified Microcontrollers ESCAR Detroit 2017
- Guillen , O. , Gruber , M. , and De Santis , F. Low-Cost Setup for Localized Semi-Invasive Optical Fault Injection Attacks—How Low Can We Go? Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE) Graz, Austria 2017
- Cui , A. and Housley , R. BADFET: Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault Injection USENIX Workshop on Offensive Technology (WOOT) Vancouver, Canada 2017
- O’Flynn , C. 2016
- van Woudenberg , J.J. , Witteman , M. , and Bakker , B. Improving Differential Power Analysis by Elastic Alignment Topics in Cryptology-CT-RSA San Francisco 2011
- Bhasin , S. , Bruneau , N. , Danger , J.L. , Guilley , S. et al. Analysis and Improvements of the DPA Contest v4 Implementation Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE) Pune, India 2014
- Popp , T. and Mangard , S. Masked Dual-Rail Pre-Charge Logic: DPA-Resistance without Routing Constraints Workshop on Cryptographic Hardware and Embedded Systems (CHES) Edinburgh, Scotland 2005
- Bernstein , D.J. Curve25519: New Diffie-Hellman Speed Records International Conference on Theory and Practice of Public-Key Cryptography (PKC) New York 207 228 2006
- Genkin , D. , Valenta , L. , and Yarom , Y. May the Fourth Be with You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve 25519 ACM Conference on Computer and Communications Security (CCS) Dallas 2017
- O’Flynn , C. and Zhizhang , C. Power Analysis Attacks against IEEE 802.15.4 Nodes Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE) Paris, France 2016