@inbook {18571, title = {Fault Attacks, Injection Techniques and Tools for Simulation}, booktitle = {Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment}, year = {2017}, pages = {149-167}, publisher = {Springer}, organization = {Springer}, edition = {First edition; 2016}, author = {Piscitelli, Roberta and Bhasin, Shivam and Regazzoni, Francesco} } @conference {18477, title = {Challenges in designing trustworthy cryptographic co-processors}, booktitle = {IEEE International Symposium on Circuits and Systems (ISCAS) 2015}, year = {2015}, month = {09/2015}, pages = {2009-2012}, publisher = {IEEE}, organization = {IEEE}, address = {Lisbon, Portugal}, abstract = {Security is becoming ubiquitous in our society. However, the vulnerability of electronic devices that implement the needed cryptographic primitives has become a major issue. This paper starts by presenting a comprehensive overview of the existing attacks to cryptography implementations. Thereafter, the state-of-the-art on some of the most critical aspects of designing cryptographic co-processors are presented. This analysis starts by considering the design of asymmetrical and symmetrical cryptographic primitives, followed by the discussion on the design and online testing of True Random Number Generation. To conclude, techniques for the detection of Hardware Trojans are also discussed}, keywords = {asymmetrical cryptographic primitives, cryptography, hardware Trojan detection techniques}, issn = {0271-4302 }, doi = {10.1109/ISCAS.2015.7169070}, url = {http://dx.doi.org/10.1109/ISCAS.2015.7169070}, author = {Regazzoni, Francesco and Graves, Ricardo and Di Natale, Giorgio and Batina, Lejla and Bhasin, Shivam and Ege, Baris and Fournaris, Apostolos P. and Mentens, Nele and Picek, Stjepan and Rozic, Vladimir and Sklavos, Nicolas and Yang, Bohan} } @conference {18480, title = {Fault attacks, injection techniques and tools for simulation}, booktitle = {10th International Conference on Design Technology of Integrated Systems in Nanoscale Era DTIS 2015}, year = {2015}, month = {04/2015}, pages = {1-6}, publisher = {IEEE}, organization = {IEEE}, address = {Naples, Italy}, abstract = {Faults attacks are a serious threat to secure devices, because they are powerful and they can be performed with extremely cheap equipment. Resistance against fault attacks is often evaluated directly on the manufactured devices, as commercial tools supporting fault evaluation do not usually provide the level of details needed to assert the security of a device. Early identification of weak points would instead be very useful as it would allow to immediately apply the appropriate countermeasures directly at design time. Moving towards this goal, in this work, we survey existing fault attacks and techniques for injecting faults, and we analyze the suitability of existing electronic design automaton commodities for estimating resistance against fault attacks. Our exploration, which includes the type of attacks that can be simulated and the limitations of each considered simulation approach, is an initial step towards the development of a complete framework for asserting fault attack robustness}, keywords = {fault attacks robustness, fault resilience, injection techniques, secure devices, security, security of data}, isbn = {978-1-4799-1999-4}, doi = {10.1109/DTIS.2015.7127352}, url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7118811}, author = {Piscitelli, Roberta and Bhasin, Shivam and Regazzoni, Francesco} } @conference {18476, title = {A survey on hardware trojan detection techniques}, booktitle = {IEEE International Symposium on Circuits and Systems (ISCAS) 2015}, year = {2015}, month = {08/2015}, pages = {2021-2024}, publisher = {IEEE}, organization = {IEEE}, edition = {2015}, address = {Lisbon, Portugal}, abstract = {Hardware Trojans recently emerged as a serious issue for computer systems, especially for those used in critical applications such as medical or military. Trojan proposed so far can affect the reliability of a device in various ways. Proposed effects range from the leakage of secret information to the complete malfunctioning of the device. A crucial point for securing the overall operation of a device is to guarantee the absence of hardware Trojans. In this paper, we survey several techniques for detecting malicious modification of circuit introduced at different phases of the design flow. We also highlight their capabilities limitations in thwarting hardware Trojans.}, keywords = {hardware Trojan detection techniques, integrated circuit reliability}, isbn = {978-1-4799-8391-9}, issn = {0271-4302}, doi = {10.1109/ISCAS.2015.7169073}, url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7152138}, author = {Bhasin, Shivam and Regazzoni, Francesco} } @conference {18088, title = {Malicious Wave: a Survey on Actively Tampering Using Electromagnetic Glitch}, booktitle = {International Symposium on Electromagnetic Compatibility 2014}, year = {2014}, month = {08/2014}, author = {Bhasin, Shivam and Maistri, Paolo and Regazzoni, Francesco} }