{"id":3640,"date":"2022-12-17T21:11:03","date_gmt":"2022-12-17T21:11:03","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=3640"},"modified":"2022-12-18T17:46:50","modified_gmt":"2022-12-18T17:46:50","slug":"xfc-a-framework-for-exploitable-fault-characterization-in-block-ciphers","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/cad-tools\/fault-injection-analysis\/xfc-a-framework-for-exploitable-fault-characterization-in-block-ciphers\/","title":{"rendered":"XFC: A framework for eXploitable Fault Characterization in block ciphers"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Tool Name<\/h2>\n\n\n\n<p>XFC: A framework for eXploitable Fault Characterization in block ciphers<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Description<\/strong><\/h2>\n\n\n\n<p>We present a framework that would analyze block ciphers for their vulnerabilities to faults and automatically predict whether a differential fault attack would be successful. The framework, which we call XFC, uses colors to analyze the fault propagation and exploitability in the cipher. XFC would be able to (a) predict the key bits that can be derived by the fault attack and (b) estimate the offline complexity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>More Info<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button\" href=\"https:\/\/bitbucket.org\/casl\/faultanalysis\/src\/master\/XFC\/\" target=\"_blank\" rel=\"noreferrer noopener\">Tool Link<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Publications\/References<\/strong><\/h2>\n\n\n\n<p>P. Khanna, C. Rebeiro and A. Hazra, &#8220;XFC: A framework for eXploitable Fault Characterization in block ciphers,&#8221;\u00a0<em>2017 54th ACM\/EDAC\/IEEE Design Automation Conference (DAC)<\/em>, 2017, pp. 1-6, doi: 10.1145\/3061639.3062340. <a rel=\"noreferrer noopener\" href=\"https:\/\/ieeexplore.ieee.org\/document\/8060292\" target=\"_blank\">https:\/\/ieeexplore.ieee.org\/document\/8060292<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Contacts<\/strong><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Tool Name XFC: A framework for eXploitable Fault Characterization in block ciphers Description We present a framework that would analyze block ciphers for their vulnerabilities to faults and automatically predict whether a differential fault attack would be successful. The framework, which we call XFC, uses colors to analyze the fault propagation and exploitability in the &hellip;<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":1696,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3640"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=3640"}],"version-history":[{"count":5,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3640\/revisions"}],"predecessor-version":[{"id":3730,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3640\/revisions\/3730"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/1696"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=3640"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}