2015
DOI: 10.1109/tcad.2015.2448687
|View full text |Cite
|
Sign up to set email alerts
|

Formal Vulnerability Analysis of Security Components

Abstract: Vulnerability to malicious fault attacks is an emerging concern for hardware circuits that are employed in mobile and embedded systems and process sensitive data. We describe a new methodology to assess the vulnerability of a circuit to such attacks, taking into account built-in protection mechanisms. Our method is based on accurate modeling of fault effects and detection status expressed by Boolean satisfiability (SAT) formulas. Vulnerability is quantified based on the number of solutions of these formulas, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 38 publications
(63 reference statements)
0
4
0
Order By: Relevance
“…Typically, model based simulations are used for analyzing the security vulnerabilities [14], [15], but they cannot cover all possible test cases in complex systems because of their computational constraints (energy and memory) [16] and floating point inaccuracies [17]. To ensure the completeness and accuracy, mathematical modeling and formal verification based vulnerability analysis techniques have been proposed [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], as shown in Table 1. Although, to some extent, mathematical modeling can overcome above-mentioned limitations, it is still prone to human error and increases the design time.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Typically, model based simulations are used for analyzing the security vulnerabilities [14], [15], but they cannot cover all possible test cases in complex systems because of their computational constraints (energy and memory) [16] and floating point inaccuracies [17]. To ensure the completeness and accuracy, mathematical modeling and formal verification based vulnerability analysis techniques have been proposed [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], as shown in Table 1. Although, to some extent, mathematical modeling can overcome above-mentioned limitations, it is still prone to human error and increases the design time.…”
Section: Related Workmentioning
confidence: 99%
“…The SAT solver based approaches are used for multistage assertion-based verification, code coverage analysis, redundant circuit removal for isolation of suspicious signals and sequential automatic test pattern generations in vulnerability analysis [18], [19]. However, they provide the information about the satisfaction of certain property but in case of failure they are unable to identify the reason, thus lack completeness in vulnerability analysis [31].…”
Section: Related Workmentioning
confidence: 99%
“…There are, for example, fault attacks where the attacker aims to induce transient errors into the chip (Bar-El et al, 2006). Making a chip robust against fault attacks can therefore be similar to making it robust against system-inherent errors (Feiten et al, 2015). However, the crucial difference is that system-inherent errors occur anywhere with a given probability, whereas a deliberate fault-attack aims to induce errors at exactly the right time and location.…”
Section: Privacy-respecting Video Surveillancementioning
confidence: 99%
“…The task of computing the number of models of a propositional formula, also referred to as #SAT, has various applications in hardware and software verification [5,4,12,15,11] as well as cryptography [16]. Classical applications are found in the area of probabilistic reasoning [24] as well as Bayesian networks [2,19,27] which are adopted in medical diagnosis and planning.…”
Section: Introductionmentioning
confidence: 99%