2016
DOI: 10.1007/978-3-319-45477-1_1
|View full text |Cite
|
Sign up to set email alerts
|

FISSC: A Fault Injection and Simulation Secure Collection

Abstract: Applications in secure components (such as smartcards, mobile phones or secure dongles) must be hardened against fault injection to guarantee security even in the presence of a malicious fault. Crafting applications robust against fault injection is an open problem for all actors of the secure application development life cycle, which prompted the development of many simulation tools. A major difficulty for these tools is the absence of representative codes, criteria and metrics to evaluate or compare obtained… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
43
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 36 publications
(43 citation statements)
references
References 15 publications
0
43
0
Order By: Relevance
“…The weakness detection and code securing processes can be performed at different code levels: source code [6], any intermediate code such as during the compilation process [7,8], or binary code [9]. Working at the assembly or binary code level seems to be the most adapted level when considering physical faults.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The weakness detection and code securing processes can be performed at different code levels: source code [6], any intermediate code such as during the compilation process [7,8], or binary code [9]. Working at the assembly or binary code level seems to be the most adapted level when considering physical faults.…”
Section: Introductionmentioning
confidence: 99%
“…We consider control-flow disruption, which is a harmful consequence of fault attacks that encompass both instruction skip faults and larger jumps that are easily performed with physical fault injection means. Such control-flow disruption enables an attacker to retrieve secret keys [15,3], bypass certain implemented countermeasures [6], or obtain certain unauthorized privileges [16,17]. Our approach, which is supported by tools and is illustrated in Figure 1, enables 1) the automatic detection of the weaknesses of native C programs to be embedded into a secure element (weakness detection is performed at the source code level and considers attacks that disrupt the control flow) and 2) the automatic injection of formally verified countermeasures at the granularity of single C statements.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This fault model corresponds to targeted attacks that attempt to bypass code, or significantly disrupt the control flow. 18,19 Note that this is a superset of other faults that may target the same bits of the target address. and Xoring the left word to the right word.…”
Section: Fault Modelsmentioning
confidence: 99%
“…In both cases, the fault model simulates any possible change to the jump target address. This fault model corresponds to targeted attacks that attempt to bypass code, or significantly disrupt the control flow . Note that this is a superset of other faults that may target the same bits of the target address.…”
Section: Introductionmentioning
confidence: 99%