Yang Li

ORCID: 0000-0003-0219-5289
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Chaos-based Image/Signal Encryption
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • Coding theory and cryptography
  • Advanced Memory and Neural Computing
  • Integrated Circuits and Semiconductor Failure Analysis
  • Adversarial Robustness in Machine Learning
  • Radiation Effects in Electronics
  • Parallel Computing and Optimization Techniques
  • Cryptography and Data Security
  • Cloud Computing and Resource Management
  • Advanced Authentication Protocols Security
  • IoT and Edge/Fog Computing
  • Smart Grid Security and Resilience
  • Software Testing and Debugging Techniques
  • Software System Performance and Reliability
  • Advanced Decision-Making Techniques
  • Semiconductor materials and devices
  • RFID technology advancements
  • Regional Economic and Spatial Analysis
  • Brain Tumor Detection and Classification
  • Per- and polyfluoroalkyl substances research
  • Ferroelectric and Negative Capacitance Devices

University of Electro-Communications
2012-2024

University of Florida
2021

Nanjing University of Aeronautics and Astronautics
2015-2018

Shenyang University of Chemical Technology
2010-2018

China Electronics Corporation (China)
2011

With the growth of Internet Things (IoT) era, protection secret information on IoT devices is becoming increasingly important. For devices, attacks that target leakage through physical side-channels (e.g., a power side-channel) are major threat in many use cases because can be accessed easily by hostile third party. However, securing resource-constrained against side-channel challenging issue. Generally, it difficult to satisfy requirements while maintaining low-power and real-time...

10.1109/jiot.2024.3355417 article EN cc-by IEEE Internet of Things Journal 2024-01-18

This paper proposes a new fault-based attack called fault sensitivity analysis (FSA) attack. In the FSA attack, injections are used to test out sensitive information leakage sensitivity. Fault means critical injection intensity that corresponds threshold between devices' normal and abnormal behaviors. We demonstrate without using values of faulty outputs, attackers can obtain secret key based on data-dependency collected data. explains successful attacks against three Advanced Encryption...

10.1109/tifs.2011.2169666 article EN IEEE Transactions on Information Forensics and Security 2011-10-03

In this paper, we present an efficient countermeasure against Fault Sensitivity Analysis (FSA) based on a configurable delay blocks (CDBs). FSA is new type of fault attack which exploits the relationship between sensitivity and secret information. Previous studies reported that it could break cryptographic modules equipped with conventional countermeasures Differential (DFA) such as redundancy calculation, Masked AND-OR Wave Dynamic Logic (WDDL). The proposed can detect both DFA attacks...

10.1109/fdtc.2012.12 article EN Workshop on Fault Diagnosis and Tolerance in Cryptography 2012-09-01

In this paper, we present an efficient countermeasure against fault sensitivity analysis (FSA) based on configurable delay blocks (CDBs). FSA is a new type of attack, which exploits the relationship between (FS) and secret information. Previous studies reported that it could break cryptographic modules equipped with conventional countermeasures differential (DFA), such as redundancy calculation, masked and-or, wave dynamic logic. The proposed can thwart both DFA attacks setup time violation...

10.1109/tvlsi.2014.2339892 article EN IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2014-08-06

This paper revisits and improves the fault sensitivity analysis (FSA) attack on WDDL-AES. At CHES 2010, FSA WDDL-AES was proposed by Li et al. based delay timing difference for complementary wires. In their attack, vulnerability of mainly comes from implementation deficiency rather than WDDL technique itself. On contrary, we explain that a well-implemented also has against due to input-data dependency critical S-box. We observed ciphertext-bit (FS) data when clock glitch is injected at final...

10.1109/hst.2011.5955013 article EN 2011-06-01

Infection is a fault attack countermeasure, which aims to destroy the dependency of faulty ciphertexts on secret key. However, current security evaluations infection countermeasures are either tailored for specific scenario or not general enough apply various instances. They cannot come convincing results, let alone make comparisons between different countermeasures. Based information theory, this paper presents generic evaluation framework that feasible and scenarios. The constructed with...

10.1109/tifs.2019.2903653 article EN IEEE Transactions on Information Forensics and Security 2019-03-20

Abstract Laser fault injection (LFI) attacks on cryptographic processor ICs are a critical threat to information systems. This paper proposes an IC-level integrated countermeasure employing leakage sensor against LFI attack. Distributed bulk current sensors monitor abnormal density caused by laser irradiation for LFI. Time-interleaved operation and sensitivity tuning can obtain partial secret key bit with small layout area penalty. Based the information, be securely updated realize...

10.7567/1347-4065/ab65d3 article EN cc-by Japanese Journal of Applied Physics 2019-12-27

To obtain a better trade-off between cost and security, practical DPA countermeasures are not likely to deploy full masking that uses one distinct mask bit for each signal. A common approach is use the same on several instances of an algorithm. This paper proposes novel power analysis method called Power Variance Analysis (PVA) reveal danger such implementations. PVA fact side-channel leakage parallel circuits has big variance when they given but random inputs. introduces basic principle...

10.5555/1870926.1871186 article EN Design, Automation, and Test in Europe 2010-03-08

In this paper, we present a fault-based security evaluation for an Elliptic Curve Cryptography (ECC) implementation using the Montgomery Powering Ladder (MPL). We focus in particular on Lopez-Dahab algorithm, which is used to calculate point elliptic curve efficiently without y - coordinate. Several previous fault analysis attacks cannot be applied ECC employing algorithm straight-forward manner. evaluate of Fault Sensitivity Analysis (FSA). Although initial work FSA was only Advanced...

10.1109/fdtc.2011.17 article EN Workshop on Fault Diagnosis and Tolerance in Cryptography 2011-09-01

Rank estimation algorithm (REA) is a useful post-analysis tool to evaluate key recovery threat of real side-channel attacks. The existing rank algorithms only consider the score lists independent subkeys. This paper looks at dependent lists, which correspond result key-recovery attack and key-difference attack, e.g. k <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">0</sub> , xmlns:xlink="http://www.w3.org/1999/xlink">1</sub>...

10.1109/asianhost.2017.8353989 article EN 2017-10-01

Field-programmable gate array (FPGA) is growing as a new platform for accelerating heavy computational tasks such machine learning and cryptography. To making FPGA acceleration easy conventional one by graphics processing units, vendors are providing high-level synthesis tools, Xilinx's SDAccel, that synthesize circuit from program written languages C, C++, OpenCL. The benefit of synthesis, however, comes with the stronger abstraction makes optimization challenging compared to development...

10.1109/gcce50665.2020.9291973 article EN 2022 IEEE 11th Global Conference on Consumer Electronics (GCCE) 2020-10-13

Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of should be overcome for future use. To these issues, privacy-preserving authentication protocols based on cryptographic algorithms have designed. However, best our knowledge, evaluation whole tag, which includes an antenna, analog front end, a digital processing block, that runs not studied. In this paper, we present...

10.1155/2015/498610 article EN cc-by The Scientific World JOURNAL 2015-01-01

Implementations of lightweight cryptographic algorithms are needed in resource-constrained environments. The National Institute Standards and Technology is evaluating the standardization authenticated encryption with associated data has selected ten finalists. This study conducts software evaluations finalists on ARM Cortex-M0, focusing three performance metrics; latency, throughput, memory usage. We also discuss impact input length parameters implementation candidates. Based evaluation...

10.1109/candarw57323.2022.00030 article EN 2022-11-01
Coming Soon ...