• Publications
  • Influence
ShieldFS: a self-healing, ransomware-aware filesystem
Preventive and reactive security measures can only partially mitigate the damage caused by modern ransomware attacks. Indeed, the remarkable amount of illicit profit and the cyber-criminals'Expand
  • 107
  • 22
Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures
Implementations of cryptographic algorithms continue to proliferate in consumer products due to the increasing demand for secure transmission of confidential information. Although the currentExpand
  • 350
  • 18
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military systems. In order toExpand
  • 190
  • 9
Countermeasures against fault attacks on software implemented AES: effectiveness and cost
In this paper we present software countermeasures specifically designed to counteract fault injection attacks during the execution of a software implementation of a cryptographic algorithm andExpand
  • 53
  • 9
Design of a parallel AES for graphics hardware using the CUDA framework
Web servers often need to manage encrypted transfers of data. The encryption activity is computationally intensive, and exposes a significant degree of parallelism. At the same time, cheap multicoreExpand
  • 92
  • 8
A code morphing methodology to automate power analysis countermeasures
We introduce a general framework to automate the application of countermeasures against Differential Power Attacks aimed at software implementations of cryptographic primitives. The approach enablesExpand
  • 68
  • 6
Low Voltage Fault Attacks on the RSA Cryptosystem
Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. The faults induced during the computation of the cryptographic primitives allow toExpand
  • 68
  • 4
Low Voltage Fault Attacks to AES and RSA on General Purpose Processors
Fault injection attacks have proven in recent times a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. A number of different techniques aimed at disturbing theExpand
  • 24
  • 4
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks
We propose an efficient and effective methods to secure software implementations of cryptographic primitives on low-end embedded systems, against passive side channel attacks relying on theExpand
  • 24
  • 3
Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES Implementation
The continuous scaling of VLSI technology and the aggressive use of low power strategies (such as subthreshold voltage) make it possible to implement standard cryptographic primitives within the veryExpand
  • 27
  • 3