{"id":"https://openalex.org/W1834056812","doi":"https://doi.org/10.1109/hst.2015.7140238","title":"High precision fault injections on the instruction cache of ARMv7-M architectures","display_name":"High precision fault injections on the instruction cache of ARMv7-M architectures","publication_year":2015,"publication_date":"2015-05-01","ids":{"openalex":"https://openalex.org/W1834056812","doi":"https://doi.org/10.1109/hst.2015.7140238","mag":"1834056812"},"language":"en","primary_location":{"id":"doi:10.1109/hst.2015.7140238","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hst.2015.7140238","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1510.01537","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044156053","display_name":"Lionel Rivi\u00e8re","orcid":null},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]},{"id":"https://openalex.org/I174015415","display_name":"Morpho (United States)","ror":"https://ror.org/05q5em355","country_code":"US","type":"company","lineage":["https://openalex.org/I174015415"]},{"id":"https://openalex.org/I205703379","display_name":"Institut Mines-T\u00e9l\u00e9com","ror":"https://ror.org/025vp2923","country_code":"FR","type":"facility","lineage":["https://openalex.org/I205703379"]}],"countries":["FR","US"],"is_corresponding":true,"raw_author_name":"Lionel Riviere","raw_affiliation_strings":["Identity & Security Alliance (The Morpho and T\u00e9l\u00e9com ParisTech Research Center)","Institut Mines-T\u00e9l\u00e9com, CNRS LTCI","SAFRAN Morpho"],"affiliations":[{"raw_affiliation_string":"Identity & Security Alliance (The Morpho and T\u00e9l\u00e9com ParisTech Research Center)","institution_ids":["https://openalex.org/I12356871","https://openalex.org/I174015415"]},{"raw_affiliation_string":"Institut Mines-T\u00e9l\u00e9com, CNRS LTCI","institution_ids":["https://openalex.org/I205703379"]},{"raw_affiliation_string":"SAFRAN Morpho","institution_ids":["https://openalex.org/I174015415"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078667203","display_name":"Zakaria Najm","orcid":null},"institutions":[{"id":"https://openalex.org/I205703379","display_name":"Institut Mines-T\u00e9l\u00e9com","ror":"https://ror.org/025vp2923","country_code":"FR","type":"facility","lineage":["https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Zakaria Najm","raw_affiliation_strings":["Institut Mines-T\u00e9l\u00e9com, CNRS LTCI"],"affiliations":[{"raw_affiliation_string":"Institut Mines-T\u00e9l\u00e9com, CNRS LTCI","institution_ids":["https://openalex.org/I205703379"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032455575","display_name":"Pablo Rauzy","orcid":"https://orcid.org/0000-0002-6293-3231"},"institutions":[{"id":"https://openalex.org/I205703379","display_name":"Institut Mines-T\u00e9l\u00e9com","ror":"https://ror.org/025vp2923","country_code":"FR","type":"facility","lineage":["https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Pablo Rauzy","raw_affiliation_strings":["Institut Mines-T\u00e9l\u00e9com, CNRS LTCI"],"affiliations":[{"raw_affiliation_string":"Institut Mines-T\u00e9l\u00e9com, CNRS LTCI","institution_ids":["https://openalex.org/I205703379"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054213189","display_name":"Jean\u2010Luc Danger","orcid":"https://orcid.org/0000-0001-5063-7964"},"institutions":[{"id":"https://openalex.org/I205703379","display_name":"Institut Mines-T\u00e9l\u00e9com","ror":"https://ror.org/025vp2923","country_code":"FR","type":"facility","lineage":["https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Jean-Luc Danger","raw_affiliation_strings":["Institut Mines-T\u00e9l\u00e9com, CNRS LTCI"],"affiliations":[{"raw_affiliation_string":"Institut Mines-T\u00e9l\u00e9com, CNRS LTCI","institution_ids":["https://openalex.org/I205703379"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064260807","display_name":"Julien Bringer","orcid":null},"institutions":[{"id":"https://openalex.org/I174015415","display_name":"Morpho (United States)","ror":"https://ror.org/05q5em355","country_code":"US","type":"company","lineage":["https://openalex.org/I174015415"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Julien Bringer","raw_affiliation_strings":["SAFRAN Morpho"],"affiliations":[{"raw_affiliation_string":"SAFRAN Morpho","institution_ids":["https://openalex.org/I174015415"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027685057","display_name":"Laurent Sauvage","orcid":"https://orcid.org/0000-0002-6940-6856"},"institutions":[{"id":"https://openalex.org/I205703379","display_name":"Institut Mines-T\u00e9l\u00e9com","ror":"https://ror.org/025vp2923","country_code":"FR","type":"facility","lineage":["https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Laurent Sauvage","raw_affiliation_strings":["Institut Mines-T\u00e9l\u00e9com, CNRS LTCI"],"affiliations":[{"raw_affiliation_string":"Institut Mines-T\u00e9l\u00e9com, CNRS LTCI","institution_ids":["https://openalex.org/I205703379"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5044156053"],"corresponding_institution_ids":["https://openalex.org/I12356871","https://openalex.org/I174015415","https://openalex.org/I205703379"],"apc_list":null,"apc_paid":null,"fwci":6.2276,"has_fulltext":false,"cited_by_count":82,"citation_normalized_percentile":{"value":0.96369502,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"62","last_page":"67"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7965293526649475},{"id":"https://openalex.org/keywords/fault-injection","display_name":"Fault injection","score":0.763607382774353},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.6555194854736328},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.6386363506317139},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6104217171669006},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.551932692527771},{"id":"https://openalex.org/keywords/data-flow-diagram","display_name":"Data flow diagram","score":0.5042599439620972},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.499953031539917},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.49297308921813965},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43524783849716187},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32915371656417847},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.246128648519516},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18985602259635925},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.10625877976417542}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7965293526649475},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.763607382774353},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.6555194854736328},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.6386363506317139},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6104217171669006},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.551932692527771},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.5042599439620972},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.499953031539917},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.49297308921813965},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43524783849716187},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32915371656417847},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.246128648519516},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18985602259635925},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.10625877976417542},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C165205528","wikidata":"https://www.wikidata.org/wiki/Q83371","display_name":"Seismology","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/hst.2015.7140238","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hst.2015.7140238","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1510.01537","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1510.01537","pdf_url":"https://arxiv.org/pdf/1510.01537","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.737.1989","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.737.1989","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://eprint.iacr.org/2015/147.pdf","raw_type":"text"},{"id":"pmh:oai:HAL:hal-01208378v1","is_oa":true,"landing_page_url":"https://hal.science/hal-01208378","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"HOST 2015: IEEE International Symposium on Hardware-Oriented Security and Trust, May 2015, Washington, United States. &#x27E8;10.1109/HST.2015.7140238&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1510.01537","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1510.01537","pdf_url":"https://arxiv.org/pdf/1510.01537","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.550000011920929}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W61109470","https://openalex.org/W116480387","https://openalex.org/W281052386","https://openalex.org/W1607469298","https://openalex.org/W1829732909","https://openalex.org/W1999528892","https://openalex.org/W2033856124","https://openalex.org/W2035296384","https://openalex.org/W2055524757","https://openalex.org/W2095785650","https://openalex.org/W2109360174","https://openalex.org/W2154909745","https://openalex.org/W2162282468","https://openalex.org/W6636353271","https://openalex.org/W6650218881"],"related_works":["https://openalex.org/W3111134937","https://openalex.org/W2587654181","https://openalex.org/W2108557605","https://openalex.org/W2095925360","https://openalex.org/W1549956274","https://openalex.org/W3080879440","https://openalex.org/W4246377515","https://openalex.org/W2052160877","https://openalex.org/W2040778456","https://openalex.org/W2027700796"],"abstract_inverted_index":{"Hardware":[0],"and":[1,22,84,95,103,128,150],"software":[2],"of":[3,122],"secured":[4,33],"embedded":[5],"systems":[6],"are":[7],"prone":[8],"to":[9,29,120,157,171],"physical":[10],"attacks.":[11,162],"In":[12,55],"particular,":[13],"fault":[14,62,107,115,132,161],"injection":[15,63],"attacks":[16,43,175],"revealed":[17],"vulnerabilities":[18],"on":[19,41,44,60,65,70,134],"the":[20,23,45,52,66,71,76,123,135,143],"data":[21,46],"control":[24,67,101],"flow":[25],"allowing":[26],"an":[27],"attacker":[28],"break":[30],"cryptographic":[31],"or":[32,176],"algorithms":[34],"implementations.":[35],"While":[36],"many":[37],"research":[38],"studies":[39],"concentrated":[40],"successful":[42],"flow,":[47,68],"only":[48],"a":[49,91,97,113],"few":[50],"targets":[51],"instruction":[53,72],"flow.":[54],"this":[56,130],"paper,":[57],"we":[58,110,164],"focus":[59],"electromagnetic":[61],"(EMFI)":[64],"especially":[69],"cache.":[73],"We":[74,89,125,145],"target":[75],"very":[77],"widespread":[78],"(smartphones,":[79],"tablets,":[80],"settop-boxes,":[81],"health-industry":[82],"monitors":[83],"sensors,":[85],"etc.)":[86],"ARMv7-M":[87],"architecture.":[88],"describe":[90,147,165],"practical":[92,131],"EMFI":[93],"platform":[94],"present":[96],"methodology":[98],"providing":[99],"high":[100,104],"level":[102],"reproducibility":[105],"over":[106],"injections.":[108],"Indeed,":[109],"observe":[111],"that":[112,137],"precise":[114],"model":[116,133],"occurs":[117],"in":[118,142],"up":[119],"96%":[121],"cases.":[124],"then":[126],"characterize":[127],"exhibit":[129],"cache":[136],"is":[138],"not":[139],"yet":[140],"considered":[141],"literature.":[144],"comprehensively":[146],"its":[148],"effects":[149],"show":[151],"how":[152,166],"it":[153,167],"can":[154,168],"be":[155],"used":[156],"reproduce":[158],"well":[159],"known":[160],"Finally,":[163],"benefits":[169],"attackers":[170],"mount":[172],"new":[173],"powerful":[174],"simplify":[177],"existing":[178],"ones.":[179]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":14},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":16},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2016-06-24T00:00:00"}
