Detecting Voltage Glitch Attacks on Secure Devices.
Asier Goikoetxea YanciStephen PicklesTughrul ArslanPublished in: BLISS (2008)
Keyphrases
- security mechanisms
- secure routing
- security protocols
- stream cipher
- cryptographic protocols
- chosen plaintext
- security measures
- network intrusion detection systems
- mobile devices
- resource constrained
- cryptographic algorithms
- security issues
- countermeasures
- information flow
- high voltage
- detecting malicious
- security flaws
- power system
- information leakage
- low voltage
- smart card
- unauthorized access
- watermarking scheme
- embedded systems
- detect malicious
- key distribution
- watermarking technique
- security requirements
- malicious activities
- ad hoc networks
- intrusion detection system