Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
fault-injection attack (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(1/132)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Early RTL analysis for SCA vulnerability in fuzzy extractors of memory-based PUF enabled devices
Lai, Xinhui
;
Jenihhin, Maksim
;
Selims, Georgios
arXiv.org
2020
/
6 p. : ill
https://doi.org/10.48550/arXiv.2008.08409
https://arxiv.org/abs/2008.08409
journal article
Related publications
1
Approaches to extra-functional verification of security and reliability aspects in hardware designs = Riistvaraprojektide turva- ja töökindlusaspektide ekstrafunktsionaalse verifitseerimise lähenemisviisid
Number of records 1, displaying
1 - 1
keyword
132
1.
fault-injection attack
2.
false data injection attack
3.
ghost injection attack
4.
fault injection
5.
Fault Injection Simulation
6.
fiber-reinforced composites and injection molding
7.
Gate Injection Transistor (GIT)
8.
gating-aware error injection
9.
injection molding
10.
injection of technical water
11.
manual hydrodynamic injection
12.
power injection
13.
reactive power injection
14.
zero injection phase
15.
attack detection
16.
attack graphs
17.
attack model
18.
attack sophistication
19.
attack trees
20.
attack vectors
21.
attack visualisation
22.
botnet attack
23.
corrosive attack
24.
cyber-attack
25.
cyber-attack pathways
26.
Denial of Service (DoS) attack
27.
discovery of attack scenarios
28.
DoS attack
29.
highly targeted attack
30.
iming side-channel attack
31.
Low-and-Slow DoS attack
32.
manufacturing-time attack
33.
Membership inference attack
34.
oracle-less attack
35.
quantum attack
36.
ransomware attack
37.
removal attack
38.
Return of the Coppersmith’s Attack (ROCA)
39.
return of the Coppersmith’s attack vulnerability
40.
SAT attack
41.
SAT-based attack
42.
side-channel attack
43.
Side-Channel Attack Detection
44.
asynchronous fault detection
45.
automatic fault diagnosis
46.
bearing fault diagnosis
47.
bi-directional fault monitoring devices
48.
conditional fault collapsing
49.
control fault models
50.
critical path fault tracing
51.
cross-layer fault tolerance
52.
cross-layered fault management
53.
extended fault class
54.
fault currents
55.
fault analysis
56.
fault analysis model
57.
fault classification
58.
fault classification
59.
fault collapsing
60.
fault compensation
61.
fault coverage
62.
fault current and voltage measurements
63.
Fault current limite
64.
fault current limiter
65.
fault detection
66.
fault detection and diagnoses
67.
fault detection and diagnosis
68.
fault diagnosis
69.
fault diagnostic
70.
fault diagnostic resolution
71.
fault diagnostics
72.
fault dignosis
73.
fault effects
74.
fault emulation
75.
fault equivalence and dominance
76.
fault handling
77.
fault handling strategy
78.
fault indicator
79.
fault Interruption
80.
fault localization
81.
fault location
82.
fault management
83.
fault masking
84.
fault modeling
85.
fault models
86.
fault monitoring
87.
fault prediction
88.
fault protection
89.
fault redundancy
90.
fault resilience
91.
fault ride through
92.
Fault ride through enhancement
93.
fault signal
94.
fault simulastion
95.
fault simulation
96.
fault simulation with critical path tracing
97.
fault tolerance
98.
fault tolerant
99.
fault tolerant control
100.
fault tolerant operation
101.
fault tolerant router design
102.
fault tolerant systems
103.
fault tree analysis
104.
fault-plane solution
105.
fault-resilience
106.
fault-resistant
107.
fault-ride-through (FRT)
108.
fault-tolerance
109.
fault-tolerant
110.
Fault-tolerant (FT) converters
111.
fault-tolerant control
112.
fault-tolerant converter
113.
functional fault model
114.
high-level control fault model
115.
high-level fault coverage
116.
high-level fault model
117.
high-level fault simulation
118.
high-level functional fault model
119.
Katun fault
120.
low-level fault redundancy
121.
no fault found
122.
No-Fault-Found
123.
open circuit fault
124.
Parallel Fault Simulation with Critical Path Backtracing
125.
parallel fault-simulation
126.
short circuit fault
127.
spectrum-based fault localization
128.
stacking fault
129.
stuck-at fault model
130.
test generation and fault diagnosis
131.
transient fault mitigation
132.
transmission lines fault
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT