Spelling suggestions: "subject:"glitch"" "subject:"glitches""
1 |
Hardware Fault Attack Detection Methods for Secure Embedded SystemsDeshpande, Chinmay Ravindra 15 February 2018 (has links)
In our daily life, we are increasingly putting our trust in embedded software applications, which run on a range of processor-based embedded systems from smartcards to pay-TV units. This trend expands the threat model of embedded applications from software into hardware. Over the last 20 years, fault attacks have emerged as an important class of hardware attacks against embedded software security. In fault attacks, an adversary breaks the security by injecting well chosen, targeted faults during the execution of embedded software, and systematically analyzing softwares fault response.
In this work, we propose cycle-accurate and fully digital techniques that can efficiently detect different types of fault attacks. The detection methods are low-cost regarding the area and power consumption and can be easily implemented using the standard cell based VLSI design flow. In addition to the architecture of the detectors, we present a detailed analysis of the design considerations that affect the cost and accuracy of the detectors. The functionality of the detectors is validated by implementing on ASIC and FPGA platforms (Spartan-6, Cyclone IV). Additionally, the proposed detection methods have demonstrated to successfully detect all of the injected faults without any false alarm. / Master of Science / Embedded systems nowadays play a very crucial role in day to day life. They are always gathering sensitive and private data of the users. So they become an attractive target for the attackers to steal this important data. As a result, the security of these devices has become a grave concern.
Fault attacks are a class of hardware attacks where the attacker injects faults into the system while it is executing a known program and observes the reaction. The abnormal reactions of the system are later analyzed to obtain the valuable data. Several mechanisms to detect such attacks exist in the literature, but they are not very effective. In this work, we first analyze the effect of different types of fault attacks on the embedded processor. Then we propose various low-cost digital techniques that can efficiently detect these attacks.
|
2 |
High Speed Clock GlitchingDesiraju, Santosh 18 February 2015 (has links)
No description available.
|
3 |
Cracked and Broken Media in 20th and 21st Century Music and SoundKelly, Caleb, n/a January 2007 (has links)
From the mid 20th century into the 21st, artists and musicians manipulated,
cracked and broke audio media technologies to produce novel, unique and
indeterminate sounds and performances. Artists such as John Cage, Nam June
Paik, Milian Kn��k, Christian Marclay, Yasunao Tone, Oval and Otomo
Yoshihide pulled apart the technologies of music playback, both the playback
devices � phonographs and CD players � and the recorded media � vinyl records
and Compact Discs. Based in the sound expansion of the 20th century musical
avant garde, this practice connects the interdisciplinary Fluxus movement with
late 20th century sound art and experimental electronic music. Cracked and
broken media techniques play a significant role in 20th century music and sound,
and continue to be productive into the 21st. The primary contribution of this
thesis is to provide a novel and detailed historical account of these practices. In
addition it considers theoretical approaches to this work. After considering
approaches through critiques of recording media, and concepts of noise, this
thesis proposes novel theorisations focusing on materiality and the everyday.
Ultimately it proposes that these practices can be read as precursors to
contemporary new media, as music and sound art cracked open the fixed
structures of �old media� technologies for their own creative purposes.
|
Page generated in 0.0392 seconds