Searched full:against (Results 1 – 25 of 35) sorted by relevance
12
240 every boot, but can mitigate against some changes that are550 bool "No hardening against hardware level fault injection"552 No hardening in SW against hardware level fault injection: power or556 bool "Moderate level hardening against hardware level fault injection"563 bool "Medium level hardening against hardware level fault injection"570 bool "Maximum level hardening against hardware level fault injection"710 only protects against some attacks against version downgrades (for778 increases protection against data leakage from MCUboot to applications via
15 * NOTE: These constructs against fault injection attacks are not guaranteed to25 * failure loop. This loop has mitigations against loop escapes / unlooping.36 * be a result of glitching attack. It does not provide protection against ROP90 /* Non-zero success value to defend against register resets. Zero is the most
41 * Security: SHA-256 provides 128 bits of security against collision attacks42 * and 256 bits of security against pre-image attacks. SHA-256 does
54 * the last line of defense against failure of the entropy source.103 * name) and is the last line of defense against failure of the
89 * @note side-channel countermeasure: algorithm strengthened against timing
117 * presereved. This offers some protection against undetected failures
102 * @note side-channel countermeasure: algorithm strengthened against timing
47 * Security: AES128-CMAC mode of operation offers 64 bits of security against
54 * security against collision attacks (that aim at finding different
41 * Security: SHA-512 provides 256 bits of security against collision attacks42 * and 512 bits of security against pre-image attacks. SHA-512 does
87 only protects against some attacks against version downgrades (for
183 * AES128-CMAC mode of operation offers 64 bits of security against collision212 against collision attacks (that aim at finding different messages that289 the correctness of the implementations by checking the results against
71 * \note only checks against defines in the sections "System
82 institute patent litigation against any entity (including a173 incurred by, or claims asserted against, such Contributor by reason
86 # Check (in software) against version downgrades.
17 compatibility, this now also checks against the number of usable229 hardening against hardware level fault injection and timing attacks238 - Added hardening against hardware level fault injection and timing attacks.283 solution that protects against some types of rollback.
43 It does not protect against the possibility of attaching a JTAG and
44 * so agrees to indemnify Cypress against all liability.
63 * so agrees to indemnify Cypress against all liability.
45 * so agrees to indemnify Cypress against all liability.
279 * - During public key validation (comparing against key-hash read from in bootutil_find_key()560 /* Compare the new image's security counter value against the in bootutil_img_validate()
175 * Configure a GPIO as input, and compare it against expected value. in serial_boot_detect()
175 * improve protection against side-channel attacks. */ in uECC_shared_secret()
54 * so agrees to indemnify Cypress against all liability.