{"id":"https://openalex.org/W2791405319","doi":"https://doi.org/10.23919/date.2018.8342268","title":"Securing conditional branches in the presence of fault attacks","display_name":"Securing conditional branches in the presence of fault attacks","publication_year":2018,"publication_date":"2018-03-01","ids":{"openalex":"https://openalex.org/W2791405319","doi":"https://doi.org/10.23919/date.2018.8342268","mag":"2791405319"},"language":"en","primary_location":{"id":"doi:10.23919/date.2018.8342268","is_oa":false,"landing_page_url":"https://doi.org/10.23919/date.2018.8342268","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1803.08359","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024101222","display_name":"Robert Schilling","orcid":"https://orcid.org/0000-0001-6462-8671"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Robert Schilling","raw_affiliation_strings":["Graz University of Technology","Graz University of Technology,#TAB#"],"affiliations":[{"raw_affiliation_string":"Graz University of Technology","institution_ids":["https://openalex.org/I4092182"]},{"raw_affiliation_string":"Graz University of Technology,#TAB#","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049878313","display_name":"Mario Werner","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Mario Werner","raw_affiliation_strings":["Graz University of Technology","Graz University of Technology,#TAB#"],"affiliations":[{"raw_affiliation_string":"Graz University of Technology","institution_ids":["https://openalex.org/I4092182"]},{"raw_affiliation_string":"Graz University of Technology,#TAB#","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015437576","display_name":"Stefan Mangard","orcid":"https://orcid.org/0000-0001-9650-8041"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Stefan Mangard","raw_affiliation_strings":["Graz University of Technology","Graz University of Technology,#TAB#"],"affiliations":[{"raw_affiliation_string":"Graz University of Technology","institution_ids":["https://openalex.org/I4092182"]},{"raw_affiliation_string":"Graz University of Technology,#TAB#","institution_ids":["https://openalex.org/I4092182"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5024101222"],"corresponding_institution_ids":["https://openalex.org/I4092182"],"apc_list":null,"apc_paid":null,"fwci":0.1687,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.57435756,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"1586","last_page":"1591"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.834617018699646},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.6341593265533447},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.6080552935600281},{"id":"https://openalex.org/keywords/error-detection-and-correction","display_name":"Error detection and correction","score":0.5228446125984192},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4264214336872101},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.42060354351997375},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4144183099269867},{"id":"https://openalex.org/keywords/fault-detection-and-isolation","display_name":"Fault detection and isolation","score":0.41161638498306274},{"id":"https://openalex.org/keywords/checksum","display_name":"Checksum","score":0.41007000207901},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3716770112514496},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.34532493352890015},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3395698666572571},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33568274974823},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2807278633117676},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.23212873935699463},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18858009576797485}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.834617018699646},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.6341593265533447},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.6080552935600281},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.5228446125984192},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4264214336872101},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.42060354351997375},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4144183099269867},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.41161638498306274},{"id":"https://openalex.org/C162372511","wikidata":"https://www.wikidata.org/wiki/Q218341","display_name":"Checksum","level":2,"score":0.41007000207901},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3716770112514496},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34532493352890015},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3395698666572571},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33568274974823},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2807278633117676},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.23212873935699463},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18858009576797485},{"id":"https://openalex.org/C172707124","wikidata":"https://www.wikidata.org/wiki/Q423488","display_name":"Actuator","level":2,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.23919/date.2018.8342268","is_oa":false,"landing_page_url":"https://doi.org/10.23919/date.2018.8342268","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1803.08359","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1803.08359","pdf_url":"https://arxiv.org/pdf/1803.08359","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"mag:2791405319","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1803.08359","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.1803.08359","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1803.08359","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1803.08359","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1803.08359","pdf_url":"https://arxiv.org/pdf/1803.08359","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6800000071525574}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2791405319.pdf","grobid_xml":"https://content.openalex.org/works/W2791405319.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W1495121609","https://openalex.org/W1527934630","https://openalex.org/W1730333074","https://openalex.org/W1734836454","https://openalex.org/W1878142362","https://openalex.org/W1980073965","https://openalex.org/W2000325148","https://openalex.org/W2005445905","https://openalex.org/W2038631119","https://openalex.org/W2066425771","https://openalex.org/W2114235603","https://openalex.org/W2134047166","https://openalex.org/W2139750209","https://openalex.org/W2143160443","https://openalex.org/W2162282468","https://openalex.org/W2170489924","https://openalex.org/W2330011596","https://openalex.org/W2346370213","https://openalex.org/W2505234834","https://openalex.org/W2604546184","https://openalex.org/W6637631948","https://openalex.org/W6637933894","https://openalex.org/W6639407586","https://openalex.org/W6676126365","https://openalex.org/W6679521471"],"related_works":["https://openalex.org/W2963225076","https://openalex.org/W3011562144","https://openalex.org/W3005046538","https://openalex.org/W2960585380","https://openalex.org/W2901207456","https://openalex.org/W2891196279","https://openalex.org/W3199622058","https://openalex.org/W2095785650","https://openalex.org/W2516933175","https://openalex.org/W3105116867","https://openalex.org/W2144052131","https://openalex.org/W3185267556","https://openalex.org/W1499791368","https://openalex.org/W1878142362","https://openalex.org/W2905160988","https://openalex.org/W3106149149","https://openalex.org/W3136728282","https://openalex.org/W2811513815","https://openalex.org/W1041658130","https://openalex.org/W3186394125"],"abstract_inverted_index":{"In":[0,59],"typical":[1],"software,":[2],"many":[3],"comparisons":[4],"and":[5,24,74,140,143,191,198,212],"subsequent":[6],"branch":[7],"operations":[8],"are":[9,34,100],"highly":[10],"critical":[11,98],"in":[12,68,101,208],"terms":[13,209],"of":[14,38,124,137,151,210],"security.":[15,201],"Examples":[16],"include":[17],"password":[18],"checks,":[19,21],"signature":[20],"secure":[22],"boot,":[23],"user":[25],"privilege":[26],"checks.":[27],"For":[28],"embedded":[29],"devices,":[30],"these":[31],"security-critical":[32],"branches":[33,99,193],"a":[35,42,48,57,108,152,169],"preferred":[36],"target":[37],"fault":[39],"attacks":[40],"as":[41],"single":[43,49],"bit":[44],"flip":[45],"or":[46],"skipping":[47],"instruction":[50],"can":[51,131,194],"lead":[52],"to":[53,56,70,75,111,174],"complete":[54],"access":[55],"system.":[58],"the":[60,122,184,206],"past,":[61],"numerous":[62],"redundancy":[63,123],"schemes":[64],"have":[65],"been":[66],"proposed":[67],"order":[69],"provide":[71,91],"control-flow-integrity":[72],"(CFI)":[73],"enable":[76],"error":[77],"detection":[78],"on":[79,165,177],"processed":[80],"data.":[81],"However,":[82],"current":[83],"countermeasures":[84],"for":[85,94,134],"general":[86],"purpose":[87],"software":[88],"do":[89],"not":[90],"protection":[92,126],"mechanisms":[93,142],"conditional":[95,113,153,192],"branches.":[96],"Hence,":[97],"practice":[102],"often":[103],"simply":[104],"duplicated.":[105],"We":[106,155,182],"present":[107],"generic":[109],"approach":[110,130,158],"protect":[112],"branches,":[114],"which":[115,167],"links":[116],"an":[117,161],"encoding-based":[118],"comparison":[119,163],"result":[120],"with":[121],"CFI":[125,141],"mechanisms.":[127],"The":[128],"presented":[129],"be":[132,195],"used":[133,171],"all":[135,149],"types":[136],"data":[138,178],"encodings":[139],"maintains":[144],"their":[145],"error-detection":[146],"capabilities":[147],"throughout":[148],"steps":[150],"branch.":[154],"demonstrate":[156],"our":[157],"by":[159],"realizing":[160],"encoded":[162],"based":[164],"AN-codes,":[166],"is":[168,214],"frequently":[170],"encoding":[172],"scheme":[173],"detect":[175],"errors":[176],"during":[179],"arithmetic":[180],"operations.":[181],"extended":[183],"LLVM":[185],"compiler":[186],"so":[187],"that":[188,205],"standard":[189],"code":[190],"protected":[196],"automatically":[197],"analyze":[199],"its":[200],"Our":[202],"design":[203],"shows":[204],"overhead":[207],"size":[211],"runtime":[213],"lower":[215],"than":[216],"state-of-the-art":[217],"duplication":[218],"schemes.":[219]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
