{"id":"https://openalex.org/W2926259481","doi":"https://doi.org/10.13154/tches.v2019.i2.199-224","title":"Shaping the Glitch: Optimizing Voltage Fault Injection Attacks","display_name":"Shaping the Glitch: Optimizing Voltage Fault Injection Attacks","publication_year":2019,"publication_date":"2019-02-28","ids":{"openalex":"https://openalex.org/W2926259481","doi":"https://doi.org/10.13154/tches.v2019.i2.199-224","mag":"2926259481"},"language":"en","primary_location":{"id":"pmh:oai:doaj.org/article:5e1b8a12d5ad4fa1a8850acd99b0b576","is_oa":true,"landing_page_url":"https://doaj.org/article/5e1b8a12d5ad4fa1a8850acd99b0b576","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2019, Iss 2 (2019)","raw_type":"article"},"type":"article","indexed_in":["datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doaj.org/article/5e1b8a12d5ad4fa1a8850acd99b0b576","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046634673","display_name":"Claudio Bozzato","orcid":null},"institutions":[{"id":"https://openalex.org/I151281966","display_name":"Cisco Systems (China)","ror":"https://ror.org/02qy75381","country_code":"CN","type":"company","lineage":["https://openalex.org/I135428043","https://openalex.org/I151281966"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bozzato, Claudio","raw_affiliation_strings":["Cisco Talos"],"affiliations":[{"raw_affiliation_string":"Cisco Talos","institution_ids":["https://openalex.org/I151281966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056869421","display_name":"Riccardo Focardi","orcid":"https://orcid.org/0000-0003-0101-0692"},"institutions":[{"id":"https://openalex.org/I149461666","display_name":"Ca' Foscari University of Venice","ror":"https://ror.org/04yzxz566","country_code":"IT","type":"education","lineage":["https://openalex.org/I149461666"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Focardi, Riccardo","raw_affiliation_strings":["Ca\u2019 Foscari University of Venice, Cryptosense"],"affiliations":[{"raw_affiliation_string":"Ca\u2019 Foscari University of Venice, Cryptosense","institution_ids":["https://openalex.org/I149461666"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010166363","display_name":"Francesco Palmarini","orcid":null},"institutions":[{"id":"https://openalex.org/I149461666","display_name":"Ca' Foscari University of Venice","ror":"https://ror.org/04yzxz566","country_code":"IT","type":"education","lineage":["https://openalex.org/I149461666"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Palmarini, Francesco","raw_affiliation_strings":["Ca\u2019 Foscari University of Venice, Yarix"],"affiliations":[{"raw_affiliation_string":"Ca\u2019 Foscari University of Venice, Yarix","institution_ids":["https://openalex.org/I149461666"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5046634673"],"corresponding_institution_ids":["https://openalex.org/I151281966"],"apc_list":null,"apc_paid":null,"fwci":2.8003,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.92584915,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/glitch","display_name":"Glitch","score":0.9564658403396606},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.552726686000824},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5080652236938477},{"id":"https://openalex.org/keywords/fault-injection","display_name":"Fault injection","score":0.4987785816192627},{"id":"https://openalex.org/keywords/voltage","display_name":"Voltage","score":0.47021248936653137},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4307854175567627},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.3693673014640808},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.34202492237091064},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.23004275560379028},{"id":"https://openalex.org/keywords/seismology","display_name":"Seismology","score":0.1728512942790985},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.1692572832107544},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.14877182245254517},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1058790385723114}],"concepts":[{"id":"https://openalex.org/C191287063","wikidata":"https://www.wikidata.org/wiki/Q543281","display_name":"Glitch","level":3,"score":0.9564658403396606},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.552726686000824},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5080652236938477},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.4987785816192627},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.47021248936653137},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4307854175567627},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.3693673014640808},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.34202492237091064},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.23004275560379028},{"id":"https://openalex.org/C165205528","wikidata":"https://www.wikidata.org/wiki/Q83371","display_name":"Seismology","level":1,"score":0.1728512942790985},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.1692572832107544},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.14877182245254517},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1058790385723114},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.0},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"pmh:oai:doaj.org/article:5e1b8a12d5ad4fa1a8850acd99b0b576","is_oa":true,"landing_page_url":"https://doaj.org/article/5e1b8a12d5ad4fa1a8850acd99b0b576","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2019, Iss 2 (2019)","raw_type":"article"},{"id":"pmh:oai:iris.unive.it:10278/3724485","is_oa":true,"landing_page_url":"http://hdl.handle.net/10278/3724485","pdf_url":null,"source":{"id":"https://openalex.org/S4306402336","display_name":"ARCA (Universit\u00e0 Ca' Foscari Venezia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149461666","host_organization_name":"Ca' Foscari University of Venice","host_organization_lineage":["https://openalex.org/I149461666"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"},{"id":"doi:10.13154/tches.v2019.i2.199-224","is_oa":true,"landing_page_url":"https://doi.org/10.13154/tches.v2019.i2.199-224","pdf_url":null,"source":{"id":"https://openalex.org/S7407052971","display_name":"UB Bochum","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:doaj.org/article:5e1b8a12d5ad4fa1a8850acd99b0b576","is_oa":true,"landing_page_url":"https://doaj.org/article/5e1b8a12d5ad4fa1a8850acd99b0b576","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2019, Iss 2 (2019)","raw_type":"article"},"sustainable_development_goals":[{"score":0.4399999976158142,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1511843316","https://openalex.org/W1516014584","https://openalex.org/W2787372482"],"related_works":["https://openalex.org/W2140328632","https://openalex.org/W2541225405","https://openalex.org/W2149184458","https://openalex.org/W3105925763","https://openalex.org/W4321012615","https://openalex.org/W2049051873","https://openalex.org/W176420734","https://openalex.org/W1522428482","https://openalex.org/W4382565642","https://openalex.org/W203668663"],"abstract_inverted_index":{"Voltage":[0],"fault":[1,53],"injection":[2,54],"is":[3],"a":[4,15,50,100,145,167],"powerful":[5],"active":[6],"side":[7],"channel":[8],"attack":[9,26,155],"that":[10,36,56],"modifies":[11],"the":[12,21,42,71,115,118,134,139,154,164,172,179],"execution-flow":[13],"of":[14,73,102,138,148],"device":[16],"by":[17,152],"creating":[18],"disturbances":[19],"on":[20,83,110,133],"power":[22],"supply":[23],"line.":[24],"The":[25],"typically":[27],"aims":[28],"at":[29],"skipping":[30],"security":[31],"checks":[32],"or":[33],"generating":[34],"side-channels":[35],"gradually":[37],"leak":[38],"sensitive":[39],"data,":[40],"including":[41],"firmware":[43,80],"code.":[44],"In":[45],"this":[46],"paper":[47],"we":[48,76],"propose":[49],"new":[51,140],"voltage":[52,60],"technique":[55],"generates":[57],"fully":[58],"arbitrary":[59,149],"glitch":[61,150],"waveforms":[62,151],"using":[63],"off-the-shelf":[64],"and":[65,93,107,125,136],"low":[66],"cost":[67],"equipment.":[68],"To":[69],"show":[70],"effectiveness":[72],"our":[74],"setup,":[75],"present":[77],"new,":[78],"unpublished":[79],"extraction":[81],"attacks":[82],"six":[84],"microcontrollers":[85],"from":[86],"three":[87],"major":[88,160],"manufacturers:":[89],"STMicroelectronics,":[90],"Texas":[91],"Instruments":[92],"Renesas":[94],"Electronics":[95],"that,":[96],"in":[97,163],"2016":[98],"declared":[99],"market":[101],"$1.5":[103],"billion,":[104],"$800":[105],"million":[106,129],"$2.5":[108],"billion":[109],"units":[111],"sold,":[112],"respectively.":[113],"Among":[114],"presented":[116],"attacks,":[117],"most":[119],"challenging":[120],"ones":[121],"exploit":[122],"multiple":[123],"vulnerabilities":[124,173],"inject":[126],"over":[127],"one":[128],"glitches,":[130],"heavily":[131],"leveraging":[132],"performance":[135,156],"repeatability":[137],"proposed":[141],"technique.":[142],"We":[143],"perform":[144],"thorough":[146],"evaluation":[147],"comparing":[153],"against":[157],"two":[158],"other":[159],"V-FI":[161],"techniques":[162],"literature.":[165],"Along":[166],"responsible":[168],"disclosure":[169],"policy,":[170],"all":[171],"have":[174],"been":[175],"timely":[176],"reported":[177],"to":[178],"manufacturers.":[180]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":7}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
