{"id":1700,"date":"2022-03-24T17:41:16","date_gmt":"2022-03-24T17:41:16","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=1700"},"modified":"2022-12-18T17:30:00","modified_gmt":"2022-12-18T17:30:00","slug":"avfsm-quantitative-measerment-of-the-vulnerability-in-fsms-to-fault-injection-attacks","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/cad-tools\/fault-injection-analysis\/avfsm-quantitative-measerment-of-the-vulnerability-in-fsms-to-fault-injection-attacks\/","title":{"rendered":"AVFSM: Quantitative Measerment of the Vulnerability in FSMs to Fault Injection Attacks"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Tool Name<\/strong><\/h2>\n\n\n\n<p>AVFSM: Quantitative&nbsp;Measurement&nbsp;of the Vulnerability in FSMs to Fault Injection Attacks<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>CAD for<\/strong><\/h2>\n\n\n\n<p>Vulnerability Factor Measurement against Fault Injection<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Description<\/strong><\/h2>\n\n\n\n<p>AVFSM is a framework that extracts the state transition graph (including the don\u2019t-care states and transitions) from a gate-level netlist using a novel Automatic Test Pattern Generation (ATPG) based approach and quantifies the vulnerabilities of the design to fault injection and hardware Trojan insertion.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>More Info<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button\" href=\"http:\/\/cad4security.org\/wp-content\/uploads\/2_AVFSM.zip\" target=\"_blank\" rel=\"noreferrer noopener\">Tool link<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button\" href=\"http:\/\/cad4security.org\/wp-content\/uploads\/3_paper1_AVFSM.pdf\">Paper Link<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Publications\/References<\/strong><\/h2>\n\n\n\n<p>A. Nahiyan, K. Xiao, K. Yang, Y. Jin, D. Forte and M. Tehranipoor, &#8220;AVFSM: A framework for identifying and mitigating vulnerabilities in FSMs,&#8221;\u00a0<em>2016 53nd ACM\/EDAC\/IEEE Design Automation Conference (DAC)<\/em>, 2016, pp. 1-6, doi: 10.1145\/2897937.2897992. <a rel=\"noreferrer noopener\" href=\"https:\/\/ieeexplore.ieee.org\/document\/7544332\" target=\"_blank\">https:\/\/ieeexplore.ieee.org\/document\/7544332<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Contacts<\/strong><\/h2>\n\n\n\n<p><a href=\"mailto:tehranipoor@ece.ufl.edu\">Mark Tehranipoor<\/a> | University of Florida<\/p>\n\n\n\n<p><a href=\"mailto:dforte@ece.ufl.edu\">Domenic Forte<\/a> | University of Florida<\/p>\n\n\n\n<p><a href=\"mailto:farimah@ece.ufl.edu\">Farimah Farahmandi<\/a> | University of Florida<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tool Name AVFSM: Quantitative&nbsp;Measurement&nbsp;of the Vulnerability in FSMs to Fault Injection Attacks CAD for Vulnerability Factor Measurement against Fault Injection Description AVFSM is a framework that extracts the state transition graph (including the don\u2019t-care states and transitions) from a gate-level netlist using a novel Automatic Test Pattern Generation (ATPG) based approach and quantifies the vulnerabilities &hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":1696,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/1700"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=1700"}],"version-history":[{"count":6,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/1700\/revisions"}],"predecessor-version":[{"id":3723,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/1700\/revisions\/3723"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/1696"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=1700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}