Co-design of security-critical real-time systems to prevent fault injection attacks: work-in-progress. Jiang, W., Xiu, L., Zhan, J., & Jiang, K. In Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, pages 9, 2018. IEEE Press. bibtex @InProceedings{jiang18co,
author = {Jiang, Wei and Xiu, Liugen and Zhan, Jinyu and Jiang, Ke},
booktitle = {Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis},
title = {Co-design of security-critical real-time systems to prevent fault injection attacks: work-in-progress},
organization = {IEEE Press},
pages = {9},
comment = {* focus: protect en/decryption of confidential messages over internal communication in distributed real-time systems
* implement error detection and recovery in AES
* check points for recovery
* measure overhead (e.g., "Fault Tolerant Coverage") for 10 parity codes
* per {word, byte} checked each round
* per {word, byte} checked each round and each SubBytes
* per byte, checked each round and each ShiftRow
* two-dimensional, checked each Round
* Residue.{3, 7, 15} per Byte, checked each Round
* DUPlication codes, checked each Round},
file = {:jiang18co - Co-design of security-critical real-time systems to prevent fault injection attacks_ work-in-progress.pdf:PDF},
groups = {fault tolerance},
timestamp = {2019-02-19},
year = {2018},
}
Downloads: 0
{"_id":"KQuYSrFxrAN6y6e3y","bibbaseid":"jiang-xiu-zhan-jiang-codesignofsecuritycriticalrealtimesystemstopreventfaultinjectionattacksworkinprogress-2018","author_short":["Jiang, W.","Xiu, L.","Zhan, J.","Jiang, K."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"propositions":[],"lastnames":["Jiang"],"firstnames":["Wei"],"suffixes":[]},{"propositions":[],"lastnames":["Xiu"],"firstnames":["Liugen"],"suffixes":[]},{"propositions":[],"lastnames":["Zhan"],"firstnames":["Jinyu"],"suffixes":[]},{"propositions":[],"lastnames":["Jiang"],"firstnames":["Ke"],"suffixes":[]}],"booktitle":"Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis","title":"Co-design of security-critical real-time systems to prevent fault injection attacks: work-in-progress","organization":"IEEE Press","pages":"9","comment":"* focus: protect en/decryption of confidential messages over internal communication in distributed real-time systems * implement error detection and recovery in AES * check points for recovery * measure overhead (e.g., \"Fault Tolerant Coverage\") for 10 parity codes * per word, byte checked each round * per word, byte checked each round and each SubBytes * per byte, checked each round and each ShiftRow * two-dimensional, checked each Round * Residue.3, 7, 15 per Byte, checked each Round * DUPlication codes, checked each Round","file":":jiang18co - Co-design of security-critical real-time systems to prevent fault injection attacks_ work-in-progress.pdf:PDF","groups":"fault tolerance","timestamp":"2019-02-19","year":"2018","bibtex":"@InProceedings{jiang18co,\n author = {Jiang, Wei and Xiu, Liugen and Zhan, Jinyu and Jiang, Ke},\n booktitle = {Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis},\n title = {Co-design of security-critical real-time systems to prevent fault injection attacks: work-in-progress},\n organization = {IEEE Press},\n pages = {9},\n comment = {* focus: protect en/decryption of confidential messages over internal communication in distributed real-time systems\n* implement error detection and recovery in AES\n * check points for recovery\n * measure overhead (e.g., \"Fault Tolerant Coverage\") for 10 parity codes\n * per {word, byte} checked each round\n * per {word, byte} checked each round and each SubBytes\n * per byte, checked each round and each ShiftRow\n * two-dimensional, checked each Round\n * Residue.{3, 7, 15} per Byte, checked each Round\n * DUPlication codes, checked each Round},\n file = {:jiang18co - Co-design of security-critical real-time systems to prevent fault injection attacks_ work-in-progress.pdf:PDF},\n groups = {fault tolerance},\n timestamp = {2019-02-19},\n year = {2018},\n}\n\n","author_short":["Jiang, W.","Xiu, L.","Zhan, J.","Jiang, K."],"key":"jiang18co","id":"jiang18co","bibbaseid":"jiang-xiu-zhan-jiang-codesignofsecuritycriticalrealtimesystemstopreventfaultinjectionattacksworkinprogress-2018","role":"author","urls":{},"metadata":{"authorlinks":{}},"downloads":0,"html":""},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/AsPiHTmHHGjgy6xSQ","dataSources":["wjZw5s4JL49uLwn3p"],"keywords":[],"search_terms":["design","security","critical","real","time","systems","prevent","fault","injection","attacks","work","progress","jiang","xiu","zhan","jiang"],"title":"Co-design of security-critical real-time systems to prevent fault injection attacks: work-in-progress","year":2018}