2020 Workshop on Fault Detection and Tolerance in Cryptography (FDTC) 2020
DOI: 10.1109/fdtc51366.2020.00009
|View full text |Cite
|
Sign up to set email alerts
|

An End-to-End Approach for Multi-Fault Attack Vulnerability Assessment

Abstract: Although multi-fault attacks are extremely powerful in defeating sophisticated hardware and software defences, detecting and exploiting such attacks remains a difficult problem, especially without any prior knowledge of the target. Our main contribution is an end-to-end approach for multi-fault attack vulnerability assessment We take advantage of target specific fault models rather than generic fault models to achieve complex multi-fault attacks that can lead to critical vulnerabilities. Target specific fault … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(17 citation statements)
references
References 17 publications
(21 reference statements)
0
13
0
Order By: Relevance
“…As already suggested, the designer can focus on critical components, or adopt a divide-andconquer approach to reduce the overall complexity. Other techniques exist: in [5], the authors aim at optimizing the number of experimental injections in the case of multiple faults, but they limit their analysis at one level at a time (e.g., software simulation) to port the results at other levels (e.g., set of injection parameters). Unlike them, our approach uses layer crossing in order to explain the fault origin.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…As already suggested, the designer can focus on critical components, or adopt a divide-andconquer approach to reduce the overall complexity. Other techniques exist: in [5], the authors aim at optimizing the number of experimental injections in the case of multiple faults, but they limit their analysis at one level at a time (e.g., software simulation) to port the results at other levels (e.g., set of injection parameters). Unlike them, our approach uses layer crossing in order to explain the fault origin.…”
Section: Discussionmentioning
confidence: 99%
“…Then, they simulated faults at the application level in order to provide a so-called "vulnerability rate" for such faults. A similar approach has been followed by Werner et al [5]: the authors carried out laser fault injection along with software fault simulation. However, they focused mostly on performing multi-fault attacks rather than proposing new or more thorough fault models.…”
Section: Institute Of Engineering Univ Grenoble Alpesmentioning
confidence: 99%
See 2 more Smart Citations
“…Dureuil et al [6] tried to generalize fault models as a result of performing laser and EM injections on RAMs and Flash memories of smart cards, they then simulated faults at the application level in order to provide a so-called "vulnerability rate" for such faults. A similar approach has been followed by Werner et al [7]: the authors carried out laser fault injection along with software fault simulation. However, they focused mostly on performing multi-fault attacks rather than proposing new or more thorough fault models.…”
Section: Introductionmentioning
confidence: 99%