2012 Seventh International Conference on Availability, Reliability and Security 2012
DOI: 10.1109/ares.2012.79
|View full text |Cite
|
Sign up to set email alerts
|

High Level Model of Control Flow Attacks for Smart Card Functional Security

Abstract: Smart card software has to implement software countermeasures to face attacks. Some of these attacks are physical disruptions of chip components that cause a misbehavior in the code execution. A successful functional attack may reveal a secret or grant an undesired authorization. In this paper, we propose to model fault attacks at source level and then simulate these attacks to find out which ones are harmful. After discussing the effects of physical attacks at assembly level and going back to their consequenc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
41
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(41 citation statements)
references
References 14 publications
0
41
0
Order By: Relevance
“…Indeed, simulation of attack injection at the source code level speeds up the detection of weaknesses compared to injection at assembly level due to the lower number of source statements. However, jump attacks that start/arrive inside a C statement cannot be simulated at C level [7]. Nevertheless, it is helpful to detect as many weaknesses as possible at source code level, and as we show in the experimental results, working at this level enables to strengthen code security by making successful attacks very difficult to perform.…”
Section: Simulation Of Attacksmentioning
confidence: 91%
See 2 more Smart Citations
“…Indeed, simulation of attack injection at the source code level speeds up the detection of weaknesses compared to injection at assembly level due to the lower number of source statements. However, jump attacks that start/arrive inside a C statement cannot be simulated at C level [7]. Nevertheless, it is helpful to detect as many weaknesses as possible at source code level, and as we show in the experimental results, working at this level enables to strengthen code security by making successful attacks very difficult to perform.…”
Section: Simulation Of Attacksmentioning
confidence: 91%
“…As code securing is often performed at source level by developers, simulating attacks at this level allows to identify the harmful ones as well as the code regions that should be secured. Simulating attacks at assembly level would require to match assembly instructions with the source code which is not trivial [7]. Furthermore, assembly programs are tightly coupled to specific architectures.…”
Section: Simulation Of Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Using a generic methodology to prove the resistance of a set of countermeasures against fault attacks, their approach was applied to a pseudo-code of a RSA-CRT signature [13] by using the Frama-C program analyzer. In the same time, Berthomé et al [4] verified a smartcard C code against control flow attacks. More recently, in [36], Rauzy et al proposed a formal methodology at the algorithm level and presented their tool (named Finja) and its application to detect possible attack paths on RSA-CRT implementation.…”
Section: Prior Artmentioning
confidence: 96%
“…The countermeasures added upon C-level fault injection campaign enabled to defeat 60% of the attacks at the assembly level. The C-level fault model doesn't have the same fault coverage of assembler-level but the number of covered attacks-to-time (or to-test cases) ratio was much higher [32] and helpful to detect many weaknesses at source code level.…”
Section: Related Workmentioning
confidence: 99%