{"id":"https://openalex.org/W4412593878","doi":"https://doi.org/10.32604/cmc.2025.066525","title":"Research on Fault Probability Based on Hamming Weight in Fault Injection Attack","display_name":"Research on Fault Probability Based on Hamming Weight in Fault Injection Attack","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4412593878","doi":"https://doi.org/10.32604/cmc.2025.066525"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.066525","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.066525","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.066525","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069439461","display_name":"Tong Wu","orcid":"https://orcid.org/0009-0006-3752-4774"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Tong Wu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5100655956","display_name":"Dawei Zhou","orcid":"https://orcid.org/0009-0001-3279-4568"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dawei Zhou","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5069439461"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.23882619,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"85","issue":"2","first_page":"3067","last_page":"3094"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7892000079154968,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7892000079154968,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.7889000177383423,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.7774999737739563,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.6078082323074341},{"id":"https://openalex.org/keywords/hamming-weight","display_name":"Hamming weight","score":0.568292498588562},{"id":"https://openalex.org/keywords/fault-injection","display_name":"Fault injection","score":0.5176801681518555},{"id":"https://openalex.org/keywords/hamming-distance","display_name":"Hamming distance","score":0.4821326434612274},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.47343114018440247},{"id":"https://openalex.org/keywords/hamming-code","display_name":"Hamming code","score":0.45335355401039124},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.36799973249435425},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34422534704208374},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2078942358493805},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.18052741885185242},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09998762607574463},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.09727519750595093},{"id":"https://openalex.org/keywords/seismology","display_name":"Seismology","score":0.06703430414199829}],"concepts":[{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.6078082323074341},{"id":"https://openalex.org/C63361517","wikidata":"https://www.wikidata.org/wiki/Q5645805","display_name":"Hamming weight","level":5,"score":0.568292498588562},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.5176801681518555},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.4821326434612274},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47343114018440247},{"id":"https://openalex.org/C73150493","wikidata":"https://www.wikidata.org/wiki/Q853922","display_name":"Hamming code","level":4,"score":0.45335355401039124},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.36799973249435425},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34422534704208374},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2078942358493805},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.18052741885185242},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09998762607574463},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.09727519750595093},{"id":"https://openalex.org/C165205528","wikidata":"https://www.wikidata.org/wiki/Q83371","display_name":"Seismology","level":1,"score":0.06703430414199829},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.0},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.066525","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.066525","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.066525","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.066525","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.5099999904632568,"display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1483831648","https://openalex.org/W3046668140","https://openalex.org/W4251236654","https://openalex.org/W4313495648","https://openalex.org/W4362721129","https://openalex.org/W4387122021","https://openalex.org/W4389990269","https://openalex.org/W4395027802","https://openalex.org/W4395485096","https://openalex.org/W4400000894","https://openalex.org/W4400489009","https://openalex.org/W4402679014","https://openalex.org/W4403951672","https://openalex.org/W4404101388","https://openalex.org/W4405397806","https://openalex.org/W4406256196","https://openalex.org/W4406304843","https://openalex.org/W4407267296","https://openalex.org/W4407731903","https://openalex.org/W4410480601"],"related_works":["https://openalex.org/W2008960744","https://openalex.org/W2105471374","https://openalex.org/W2963549154","https://openalex.org/W2158117886","https://openalex.org/W1987803429","https://openalex.org/W1582340598","https://openalex.org/W1519122282","https://openalex.org/W2182731056","https://openalex.org/W3013281356","https://openalex.org/W2740543340"],"abstract_inverted_index":{"Fault":[0,56,99],"attacks":[1,13,73],"have":[2],"emerged":[3],"as":[4,36],"an":[5,162],"increasingly":[6],"effective":[7],"approach":[8],"for":[9,87],"integrated":[10],"circuit":[11],"security":[12],"due":[14],"to":[15,64,138],"their":[16],"short":[17],"execution":[18],"time":[19],"and":[20,49,123,155,180,193,206],"minimal":[21],"data":[22,131,175,204],"requirement.":[23],"However,":[24],"the":[25,55,77,81,85,115,139,174],"lack":[26],"of":[27,47,80,151,177,202],"a":[28,33,98,147,166,191],"unified":[29,192],"leakage":[30,125],"model":[31],"remains":[32],"critical":[34],"challenge,":[35],"existing":[37,140],"methods":[38,199],"often":[39],"rely":[40],"on":[41,60,95,104,161],"algorithm-specific":[42],"details":[43,90],"or":[44,91],"prior":[45],"knowledge":[46],"plaintexts":[48],"intermediate":[50],"values.":[51],"This":[52,67],"paper":[53],"proposes":[54],"Probability":[57],"Model":[58],"based":[59,103],"Hamming":[61,128],"Weight":[62],"(FPHW)":[63],"address":[65],"this.":[66],"novel":[68],"statistical":[69,78],"framework":[70,195],"quantifies":[71],"fault":[72,120,157,178],"by":[74,113,133],"solely":[75],"analyzing":[76],"response":[79],"target":[82],"device,":[83],"eliminating":[84],"need":[86],"attack":[88],"algorithm":[89],"implementation":[92,164],"specifics.":[93],"Building":[94],"this":[96],"model,":[97],"Injection":[100],"Attack":[101],"method":[102,144],"Mutual":[105,141],"Information":[106,142],"(FPMIA)":[107],"is":[108],"introduced,":[109],"which":[110],"recovers":[111],"keys":[112],"leveraging":[114],"mutual":[116],"information":[117],"between":[118,153],"measured":[119,154],"probability":[121,179],"traces":[122],"simulated":[124],"derived":[126],"from":[127],"weight,":[129],"reducing":[130],"requirements":[132],"at":[134],"least":[135],"44%":[136],"compared":[137],"Analysis":[143],"while":[145],"achieving":[146],"high":[148],"correlation":[149],"coefficient":[150],"0.9403":[152],"modeled":[156],"probabilities.":[158],"Experimental":[159],"validation":[160],"AES-128":[163],"via":[165],"Microcontroller":[167],"Unit":[168],"demonstrates":[169],"that":[170,196],"FPHW":[171],"accurately":[172],"captures":[173],"dependence":[176],"FPMIA":[181],"achieves":[182],"efficient":[183,194],"key":[184],"recovery":[185],"with":[186],"robust":[187],"noise":[188],"tolerance,":[189],"establishing":[190],"surpasses":[197],"traditional":[198],"in":[200],"terms":[201],"generality,":[203],"efficiency,":[205],"practical":[207],"applicability.":[208]},"counts_by_year":[],"updated_date":"2025-12-05T23:21:25.405358","created_date":"2025-10-10T00:00:00"}
