International audienceSmartcard implementations are prone to perturbation attacks that consist in changing the normal behavior of components in order to create exploitable errors. Perturbation attacks could be realized by different means such as laser beams involving costly and complex injection platforms. In the context of black box or grey box evaluation, there is a strong necessity of identifying fault injection vulnerabilities in developed products. This is why we propose to integrate the injection mechanism straight into the smartcard project. The embedded fault simulator program is thus integrated with the chip software and its effects can be analyzed by side-channel observations, which is not the case with any existing fault simulators. In this paper, we present this new concept and its architectural design. We show then how to implement the simulator on a real smartcard product. Finally, to validate this approach, we study the functional and side-channel impact of fault injection on a standard algorithm provided by the host smartcard
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.