{"id":"https://openalex.org/W4414869607","doi":"https://doi.org/10.62056/an-49qxqi","title":"Fly Away: Lifting Fault Security through Canaries and the Uniform Random Fault Model","display_name":"Fly Away: Lifting Fault Security through Canaries and the Uniform Random Fault Model","publication_year":2025,"publication_date":"2025-10-06","ids":{"openalex":"https://openalex.org/W4414869607","doi":"https://doi.org/10.62056/an-49qxqi"},"language":"en","primary_location":{"id":"doi:10.62056/an-49qxqi","is_oa":true,"landing_page_url":"https://doi.org/10.62056/an-49qxqi","pdf_url":"https://cic.iacr.org/p/2/3/19/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://cic.iacr.org/p/2/3/19/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059445412","display_name":"Ga\u00ebtan Cassiers","orcid":"https://orcid.org/0000-0001-5426-9345"},"institutions":[{"id":"https://openalex.org/I4210086502","display_name":"CryptoExperts (France)","ror":"https://ror.org/0030xrh72","country_code":"FR","type":"company","lineage":["https://openalex.org/I4210086502"]},{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE","FR"],"is_corresponding":true,"raw_author_name":"Ga\u00ebtan Cassiers","raw_affiliation_strings":["CryptoExperts","UCLouvain"],"affiliations":[{"raw_affiliation_string":"CryptoExperts","institution_ids":["https://openalex.org/I4210086502"]},{"raw_affiliation_string":"UCLouvain","institution_ids":["https://openalex.org/I95674353"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020954518","display_name":"Siemen Dhooghe","orcid":"https://orcid.org/0000-0003-0591-7355"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Siemen Dhooghe","raw_affiliation_strings":["KU Leuven"],"affiliations":[{"raw_affiliation_string":"KU Leuven","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014843693","display_name":"Thorben Moos","orcid":"https://orcid.org/0000-0003-3809-9803"},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Thorben Moos","raw_affiliation_strings":["UCLouvain"],"affiliations":[{"raw_affiliation_string":"UCLouvain","institution_ids":["https://openalex.org/I95674353"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101432394","display_name":"Sayandeep Saha","orcid":"https://orcid.org/0000-0002-5535-1102"},"institutions":[{"id":"https://openalex.org/I162827531","display_name":"Indian Institute of Technology Bombay","ror":"https://ror.org/02qyf5152","country_code":"IN","type":"education","lineage":["https://openalex.org/I162827531"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sayandeep Saha","raw_affiliation_strings":["IIT Bombay"],"affiliations":[{"raw_affiliation_string":"IIT Bombay","institution_ids":["https://openalex.org/I162827531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070542865","display_name":"Fran\u00e7ois\u2010Xavier Standaert","orcid":"https://orcid.org/0000-0001-7444-0285"},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Fran\u00e7ois-Xavier Standaert","raw_affiliation_strings":["UCLouvain"],"affiliations":[{"raw_affiliation_string":"UCLouvain","institution_ids":["https://openalex.org/I95674353"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5059445412"],"corresponding_institution_ids":["https://openalex.org/I4210086502","https://openalex.org/I95674353"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14731368,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.6283000111579895},{"id":"https://openalex.org/keywords/stuck-at-fault","display_name":"Stuck-at fault","score":0.5947999954223633},{"id":"https://openalex.org/keywords/fault-model","display_name":"Fault model","score":0.5878000259399414},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.5304999947547913},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.5271000266075134},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.4077000021934509},{"id":"https://openalex.org/keywords/concrete-security","display_name":"Concrete security","score":0.3675000071525574},{"id":"https://openalex.org/keywords/fault-injection","display_name":"Fault injection","score":0.36649999022483826},{"id":"https://openalex.org/keywords/exponential-function","display_name":"Exponential function","score":0.3416999876499176}],"concepts":[{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.6283000111579895},{"id":"https://openalex.org/C13625343","wikidata":"https://www.wikidata.org/wiki/Q7627418","display_name":"Stuck-at fault","level":4,"score":0.5947999954223633},{"id":"https://openalex.org/C167391956","wikidata":"https://www.wikidata.org/wiki/Q1401211","display_name":"Fault model","level":3,"score":0.5878000259399414},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.54830002784729},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.5304999947547913},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.5271000266075134},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.4666000008583069},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.4077000021934509},{"id":"https://openalex.org/C147343967","wikidata":"https://www.wikidata.org/wiki/Q5159078","display_name":"Concrete security","level":3,"score":0.3675000071525574},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.36649999022483826},{"id":"https://openalex.org/C151376022","wikidata":"https://www.wikidata.org/wiki/Q168698","display_name":"Exponential function","level":2,"score":0.3416999876499176},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.34119999408721924},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.3391000032424927},{"id":"https://openalex.org/C126953365","wikidata":"https://www.wikidata.org/wiki/Q5438152","display_name":"Fault coverage","level":3,"score":0.3345000147819519},{"id":"https://openalex.org/C21267803","wikidata":"https://www.wikidata.org/wiki/Q5438159","display_name":"Fault indicator","level":4,"score":0.33239999413490295},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3165999948978424},{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.3098999857902527},{"id":"https://openalex.org/C101722063","wikidata":"https://www.wikidata.org/wiki/Q218825","display_name":"Random access","level":2,"score":0.30469998717308044},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.30410000681877136},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.2962999939918518},{"id":"https://openalex.org/C107094494","wikidata":"https://www.wikidata.org/wiki/Q428453","display_name":"Fault tree analysis","level":2,"score":0.29409998655319214},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2768999934196472},{"id":"https://openalex.org/C114289077","wikidata":"https://www.wikidata.org/wiki/Q3284399","display_name":"Statistical model","level":2,"score":0.26759999990463257},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.26649999618530273},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.2606000006198883},{"id":"https://openalex.org/C122123141","wikidata":"https://www.wikidata.org/wiki/Q176623","display_name":"Random variable","level":2,"score":0.25769999623298645}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.62056/an-49qxqi","is_oa":true,"landing_page_url":"https://doi.org/10.62056/an-49qxqi","pdf_url":"https://cic.iacr.org/p/2/3/19/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:dial.uclouvain.be:boreal:311720","is_oa":true,"landing_page_url":"http://hdl.handle.net/2078.1/311720","pdf_url":null,"source":{"id":"https://openalex.org/S4306401902","display_name":"Digital Access to Libraries (Universit\u00e9 catholique de Louvain (UCL), l'Universit\u00e9 de Namur (UNamur) and the Universit\u00e9 Saint-Louis (USL-B))","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I95674353","host_organization_name":"UCLouvain","host_organization_lineage":["https://openalex.org/I95674353"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Communications in Cryptology, Vol. 2, no.3, p. 19 (2025)","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.62056/an-49qxqi","is_oa":true,"landing_page_url":"https://doi.org/10.62056/an-49qxqi","pdf_url":"https://cic.iacr.org/p/2/3/19/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1329855610","display_name":null,"funder_award_id":"project","funder_id":"https://openalex.org/F4320321390","funder_display_name":"Fonds De La Recherche Scientifique - FNRS"},{"id":"https://openalex.org/G5641042146","display_name":"Connecting Symmetric and Asymmetric  Cryptography for Leakage and Faults","funder_award_id":"101096871","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G7401677150","display_name":"Generation and Verification of Masking Countermeasures Against Side-Channel Attacks","funder_award_id":"101077506","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320321390","display_name":"Fonds De La Recherche Scientifique - FNRS","ror":"https://ror.org/03q83t159"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414869607.pdf","grobid_xml":"https://content.openalex.org/works/W4414869607.grobid-xml"},"referenced_works_count":47,"referenced_works":["https://openalex.org/W2856121","https://openalex.org/W116480387","https://openalex.org/W154022573","https://openalex.org/W191000419","https://openalex.org/W1483831648","https://openalex.org/W1493213353","https://openalex.org/W1541150254","https://openalex.org/W1592625985","https://openalex.org/W1663689473","https://openalex.org/W1829732909","https://openalex.org/W2097651164","https://openalex.org/W2111725598","https://openalex.org/W2124619552","https://openalex.org/W2154909745","https://openalex.org/W2160586212","https://openalex.org/W2164908759","https://openalex.org/W2170489924","https://openalex.org/W2281560505","https://openalex.org/W2423338439","https://openalex.org/W2536698892","https://openalex.org/W2556196092","https://openalex.org/W2611707061","https://openalex.org/W2612816951","https://openalex.org/W2727663768","https://openalex.org/W2751043011","https://openalex.org/W2805111206","https://openalex.org/W2886903924","https://openalex.org/W2889402643","https://openalex.org/W2973378704","https://openalex.org/W3004433901","https://openalex.org/W3026150251","https://openalex.org/W3037437399","https://openalex.org/W3085353452","https://openalex.org/W3216514701","https://openalex.org/W4223504011","https://openalex.org/W4235346328","https://openalex.org/W4281679292","https://openalex.org/W4312920563","https://openalex.org/W4317928273","https://openalex.org/W4365808111","https://openalex.org/W4387415064","https://openalex.org/W4389395093","https://openalex.org/W4389858351","https://openalex.org/W4391920149","https://openalex.org/W4396657275","https://openalex.org/W4402810788","https://openalex.org/W4405144486"],"related_works":[],"abstract_inverted_index":{"Cryptographic":[0],"implementations":[1,79],"are":[2],"vulnerable":[3],"to":[4,12,73,132,145,166,225],"active":[5],"physical":[6],"attacks":[7,77],"where":[8],"adversaries":[9],"inject":[10],"faults":[11,104],"extract":[13],"sensitive":[14],"information.":[15],"Existing":[16],"fault":[17,25,46,95,137,148,159,168,174,201],"models,":[18,26,38],"such":[19,161,234],"as":[20,162],"the":[21,30,42,56,92,101,135,143,171,184,190,196,207,230],"threshold":[22],"and":[23,105,195],"random":[24,94,136,173],"assume":[27],"limitations":[28],"on":[29,100,205],"amount":[31],"or":[32,118],"probability":[33,219],"of":[34,44,50,55,103,112,200,209,216],"injecting":[35],"faults.":[36],"Such":[37],"however,":[39],"insufficiently":[40],"address":[41,86],"case":[43],"practical":[45,197],"injection":[47],"methods":[48],"capable":[49],"faulting":[51,111],"a":[52,59,108,116,156,177,223],"large":[53],"proportion":[54],"wires":[57,114],"in":[58,82,115,125,134,142,170,180,183],"circuit":[60,117,144,181],"with":[61,155],"high":[62,218],"probability.":[63],"Prior":[64],"works":[65],"have":[66],"shown":[67],"that":[68,123,152,227],"this":[69,87,126],"insufficiency":[70],"can":[71,129,164],"lead":[72,165],"concrete":[74],"key":[75],"recovery":[76],"against":[78,214],"proven":[80],"secure":[81],"these":[83],"models.":[84],"We":[85,120,150],"blind":[88],"spot":[89],"by":[90,139,233],"introducing":[91],"uniform":[93,109,172],"model,":[96],"which":[97],"relaxes":[98],"assumptions":[99],"amount/probability":[102],"instead":[106],"assumes":[107],"probabilistic":[110],"all":[113],"region.":[119],"then":[121],"show":[122],"security":[124,133,169,185],"new":[127],"model":[128,138,175],"be":[130],"reduced":[131],"inserting":[140],"canaries":[141,154],"ensure":[146],"secret-independent":[147],"detection.":[149],"prove":[151],"combining":[153],"more":[157],"classical":[158],"countermeasure":[160],"redundancy":[163],"exponential":[167],"at":[176],"polynomial":[178],"cost":[179],"size":[182],"parameter.":[186],"Finally,":[187],"we":[188],"discuss":[189],"interactions":[191],"between":[192],"our":[193],"work":[194],"engineering":[198],"challenges":[199],"security,":[202],"shedding":[203],"light":[204],"how":[206],"combination":[208],"state-of-the-art":[210],"countermeasures":[211],"may":[212],"protect":[213],"injections":[215],"many":[217],"faults,":[220],"while":[221],"opening":[222],"path":[224],"methodologies":[226],"formally":[228],"analyze":[229],"guarantees":[231],"provided":[232],"countermeasures.":[235]},"counts_by_year":[],"updated_date":"2026-03-22T08:09:32.410652","created_date":"2025-10-10T00:00:00"}
