{"id":"https://openalex.org/W4379116100","doi":"https://doi.org/10.23919/date56975.2023.10137038","title":"SCFI: State Machine Control-Flow Hardening Against Fault Attacks","display_name":"SCFI: State Machine Control-Flow Hardening Against Fault Attacks","publication_year":2023,"publication_date":"2023-04-01","ids":{"openalex":"https://openalex.org/W4379116100","doi":"https://doi.org/10.23919/date56975.2023.10137038"},"language":"en","primary_location":{"id":"doi:10.23919/date56975.2023.10137038","is_oa":false,"landing_page_url":"http://dx.doi.org/10.23919/date56975.2023.10137038","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049864020","display_name":"Pascal Nasahl","orcid":"https://orcid.org/0000-0002-7440-4302"},"institutions":[{"id":"https://openalex.org/I4210134318","display_name":"University of Technology","ror":"https://ror.org/03gbw6p94","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210134318"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Pascal Nasahl","raw_affiliation_strings":["Grz. University of Technology"],"affiliations":[{"raw_affiliation_string":"Grz. University of Technology","institution_ids":["https://openalex.org/I4210134318"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032538182","display_name":"Martin Unterguggenberger","orcid":"https://orcid.org/0000-0002-2713-192X"},"institutions":[{"id":"https://openalex.org/I4210134318","display_name":"University of Technology","ror":"https://ror.org/03gbw6p94","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210134318"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Martin Unterguggenberger","raw_affiliation_strings":["Lamarr Security Research","Grz. University of Technology"],"affiliations":[{"raw_affiliation_string":"Lamarr Security Research","institution_ids":[]},{"raw_affiliation_string":"Grz. University of Technology","institution_ids":["https://openalex.org/I4210134318"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064280287","display_name":"Rishub Nagpal","orcid":"https://orcid.org/0000-0003-2756-2065"},"institutions":[{"id":"https://openalex.org/I4210134318","display_name":"University of Technology","ror":"https://ror.org/03gbw6p94","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210134318"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Rishub Nagpal","raw_affiliation_strings":["Lamarr Security Research","Grz. University of Technology"],"affiliations":[{"raw_affiliation_string":"Lamarr Security Research","institution_ids":[]},{"raw_affiliation_string":"Grz. University of Technology","institution_ids":["https://openalex.org/I4210134318"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113491566","display_name":"Robert Schilling","orcid":null},"institutions":[{"id":"https://openalex.org/I4210134318","display_name":"University of Technology","ror":"https://ror.org/03gbw6p94","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210134318"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Robert Schilling","raw_affiliation_strings":["Grz. University of Technology"],"affiliations":[{"raw_affiliation_string":"Grz. University of Technology","institution_ids":["https://openalex.org/I4210134318"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068200421","display_name":"David Schrammel","orcid":"https://orcid.org/0009-0004-5913-6452"},"institutions":[{"id":"https://openalex.org/I4210134318","display_name":"University of Technology","ror":"https://ror.org/03gbw6p94","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210134318"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"David Schrammel","raw_affiliation_strings":["Grz. University of Technology"],"affiliations":[{"raw_affiliation_string":"Grz. University of Technology","institution_ids":["https://openalex.org/I4210134318"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015437576","display_name":"Stefan Mangard","orcid":"https://orcid.org/0000-0001-9650-8041"},"institutions":[{"id":"https://openalex.org/I4210134318","display_name":"University of Technology","ror":"https://ror.org/03gbw6p94","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210134318"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Stefan Mangard","raw_affiliation_strings":["Lamarr Security Research","Grz. University of Technology"],"affiliations":[{"raw_affiliation_string":"Lamarr Security Research","institution_ids":[]},{"raw_affiliation_string":"Grz. University of Technology","institution_ids":["https://openalex.org/I4210134318"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5049864020"],"corresponding_institution_ids":["https://openalex.org/I4210134318"],"apc_list":null,"apc_paid":null,"fwci":0.3503,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.6344275,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/finite-state-machine","display_name":"Finite-state machine","score":0.7387500405311584},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6964895725250244},{"id":"https://openalex.org/keywords/fault-injection","display_name":"Fault injection","score":0.657681405544281},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.6110279560089111},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5845475196838379},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.5760958194732666},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.4819324016571045},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4496881067752838},{"id":"https://openalex.org/keywords/control-flow-graph","display_name":"Control flow graph","score":0.44498351216316223},{"id":"https://openalex.org/keywords/triple-modular-redundancy","display_name":"Triple modular redundancy","score":0.43478843569755554},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.43005314469337463},{"id":"https://openalex.org/keywords/fault-model","display_name":"Fault model","score":0.414679616689682},{"id":"https://openalex.org/keywords/fault-coverage","display_name":"Fault coverage","score":0.41350096464157104},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3852129578590393},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.3408063054084778},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23369508981704712},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.18826773762702942},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.17221084237098694},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.15205925703048706},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.13299116492271423},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10082671046257019}],"concepts":[{"id":"https://openalex.org/C167822520","wikidata":"https://www.wikidata.org/wiki/Q176452","display_name":"Finite-state machine","level":2,"score":0.7387500405311584},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6964895725250244},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.657681405544281},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.6110279560089111},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5845475196838379},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.5760958194732666},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.4819324016571045},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4496881067752838},{"id":"https://openalex.org/C27458966","wikidata":"https://www.wikidata.org/wiki/Q1187693","display_name":"Control flow graph","level":2,"score":0.44498351216316223},{"id":"https://openalex.org/C196371267","wikidata":"https://www.wikidata.org/wiki/Q3998979","display_name":"Triple modular redundancy","level":3,"score":0.43478843569755554},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.43005314469337463},{"id":"https://openalex.org/C167391956","wikidata":"https://www.wikidata.org/wiki/Q1401211","display_name":"Fault model","level":3,"score":0.414679616689682},{"id":"https://openalex.org/C126953365","wikidata":"https://www.wikidata.org/wiki/Q5438152","display_name":"Fault coverage","level":3,"score":0.41350096464157104},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3852129578590393},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.3408063054084778},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23369508981704712},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.18826773762702942},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.17221084237098694},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.15205925703048706},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.13299116492271423},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10082671046257019},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/date56975.2023.10137038","is_oa":false,"landing_page_url":"http://dx.doi.org/10.23919/date56975.2023.10137038","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W22191693","https://openalex.org/W1485627328","https://openalex.org/W2057358220","https://openalex.org/W2072402822","https://openalex.org/W2164815137","https://openalex.org/W2170489924","https://openalex.org/W2538614402","https://openalex.org/W2560082747","https://openalex.org/W2750990141","https://openalex.org/W2751658612","https://openalex.org/W2771454144","https://openalex.org/W2884219450","https://openalex.org/W2983058739","https://openalex.org/W3015806656","https://openalex.org/W3139014585","https://openalex.org/W3185956915","https://openalex.org/W3216514701","https://openalex.org/W4213437024","https://openalex.org/W4251236654","https://openalex.org/W4285345420","https://openalex.org/W4294326097","https://openalex.org/W6685043173","https://openalex.org/W6743496458","https://openalex.org/W6743926752","https://openalex.org/W6754635950","https://openalex.org/W6775654324","https://openalex.org/W6792027634"],"related_works":["https://openalex.org/W2741405272","https://openalex.org/W2899623659","https://openalex.org/W2138385884","https://openalex.org/W2166895275","https://openalex.org/W1600260729","https://openalex.org/W2034762427","https://openalex.org/W2998775986","https://openalex.org/W157564837","https://openalex.org/W2080313875","https://openalex.org/W3216514701"],"abstract_inverted_index":{"Fault":[0],"injection":[1],"(FI)":[2],"is":[3,56],"a":[4,17,67,90,100,129,177,204,227],"powerful":[5],"attack":[6,92],"methodology":[7],"allowing":[8],"an":[9,39,167],"adversary":[10,40],"to":[11,41,57,144],"entirely":[12],"break":[13],"the":[14,43,46,111,118,134,140,146,151,154,158,192,219,222],"security":[15,79],"of":[16,45,120,128,181,221],"target":[18],"device.":[19],"As":[20],"finite-state":[21],"machines":[22,225],"(FSMs)":[23],"are":[24,114,161],"fundamental":[25],"hardware":[26],"building":[27],"blocks":[28],"responsible":[29],"for":[30],"controlling":[31],"systems,":[32],"inducing":[33],"faults":[34,65],"into":[35,176],"these":[36,54],"controllers":[37],"enables":[38],"hijack":[42],"execution":[44,135],"integrated":[47],"circuit.":[48],"A":[49],"common":[50],"defense":[51],"strategy":[52],"mitigating":[53],"attacks":[55],"manually":[58],"instantiate":[59],"FSMs":[60,186,209],"multiple":[61,121],"times":[62],"and":[63,190],"detect":[64],"using":[66,211,226],"majority":[68],"voting":[69],"logic.":[70],"However,":[71],"as":[72,137,139],"each":[73],"additional":[74,82],"FSM":[75,103],"instance":[76],"only":[77],"provides":[78,199],"against":[80],"one":[81],"induced":[83],"fault,":[84],"this":[85,95],"approach":[86],"scales":[87],"poorly":[88],"in":[89,117],"multi-fault":[91],"scenario.":[93],"In":[94],"paper,":[96],"we":[97,216],"present":[98],"SCFI:":[99],"strong,":[101],"probabilistic":[102],"protection":[104,201],"mechanism":[105],"ensuring":[106],"that":[107,197],"control-flow":[108,113],"deviations":[109],"from":[110],"intended":[112],"detected":[115],"even":[116],"presence":[119],"faults.":[122],"At":[123],"its":[124],"core,":[125],"SCFI":[126,165,175,198],"consists":[127],"hardened":[130],"next-state":[131],"function":[132,159],"absorbing":[133],"history":[136],"well":[138],"FSM's":[141],"control":[142],"signals":[143],"derive":[145],"next":[147],"state.":[148],"When":[149],"either":[150],"absorbed":[152],"inputs,":[153],"state":[155,224],"registers,":[156],"or":[157],"itself":[160],"affected":[162],"by":[163],"faults,":[164],"triggers":[166],"error":[168],"with":[169,203],"no":[170],"detection":[171],"latency.":[172],"We":[173],"integrate":[174],"synthesis":[178],"tool":[179],"capable":[180],"automatically":[182],"hardening":[183],"arbitrary":[184],"unprotected":[185],"without":[187],"user":[188],"interaction":[189],"open-source":[191],"tool.":[193,231],"Our":[194],"evaluation":[195],"shows":[196],"strong":[200],"guarantees":[202],"better":[205],"area-time":[206],"product":[207],"than":[208],"protected":[210,223],"classical":[212],"redundancy-based":[213],"approaches.":[214],"Finally,":[215],"formally":[217],"verify":[218],"resilience":[220],"pre-silicon":[228],"fault":[229],"analysis":[230]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
