Filters








4,108 Hits in 12.2 sec

Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks [chapter]

Lionel Rivière, Marie-Laure Potet, Thanh-Ha Le, Julien Bringer, Hervé Chabanne, Maxime Puys
2015 Lecture Notes in Computer Science  
We chose two independent tools presented in 2014, the Laser Attack Robustness (Lazart) and the Embedded Fault Simulator (EFS) in order to evaluate software implementations against multiple fault injection  ...  Software techniques strengthen such implementations to enhance their robustness against fault attacks. Exhaustively testing physical fault injections is time consuming and requires complex platforms.  ...  Our Contributions -We propose a global process combining high-level and low-level robustness evaluation against multiple fault injections -We formalize the relationship between source and assembly attacks  ... 
doi:10.1007/978-3-319-17040-4_7 fatcat:gniuvrjvfbadtcnuaojwy5pf7m

Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections

Marie-Laure Potet, Laurent Mounier, Maxime Puys, Louis Dureuil
2014 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation  
We propose a global approach, called Lazart, to evaluate code robustness against fault injections targeting control flow modifications. The originality of Lazart is twofolds.  ...  1 In the domain of smart cards, secured devices must be protected against high level attack potential [1] .  ...  The Lazart approach The approach we proposed, called Lazart, targets code robustness evaluation against multiple and volatile fault injections.  ... 
doi:10.1109/icst.2014.34 dblp:conf/icst/PotetMPD14 fatcat:gbzjezyqafbhpnbpqqjvk5o3u4

High-Level Simulation for Multiple Fault Injection Evaluation [chapter]

Maxime Puys, Lionel Rivière, Julien Bringer, Thanh-ha Le
2015 Lecture Notes in Computer Science  
This work exposes a source code-base simulation approach designed to evaluate the robustness of high-level secured implementations against single and multiple fault injections.  ...  In addition to an unprotected CRT-RSA implementation, we successfully attacked two countermeasures with the high-level simulation under the data fault model.  ...  Conclusion We propose an approach to evaluate the robustness of secured implementations against multiple fault injections. This approach works on high-level source codes (such as C).  ... 
doi:10.1007/978-3-319-17016-9_19 fatcat:xoe2wvf7gfhzvp6ep3m32s3nvm

An RTOS-based Fault Injection Simulator for Embedded Processors

Nejmeddine ALIMI, Younes LAHBIB, Mohsen MACHHOUT, Rached TOURKI
2017 International Journal of Advanced Computer Science and Applications  
This paper reviews recent embedded fault injection simulators from literature and presents an embedded high-level fault injection mechanism based on a Real-Time Operating System (RTOS).  ...  Evaluating embedded systems vulnerability to faults injection attacks has gained importance in recent years due to the rising threats they bring to chips security.  ...  With identified fault models, evaluation of robustness against fault attacks has been made easier and optimized under simulation.  ... 
doi:10.14569/ijacsa.2017.080537 fatcat:rhji4qfuojcjfp5i6kizgnpfgu

A Systematic Review of Fault Injection Attacks on IoT Systems

Aakash Gangolli, Qusay H. Mahmoud, Akramul Azim
2022 Electronics  
Hybrid attack detection methods at the software level are proposed to enhance the security of IoT systems against fault injection attacks.  ...  against fault injection attacks.  ...  The combined Lazart and EFS tool [41] tackled this problem by combining multiple low-level software fault models to precisely simulate high-level hardware attacks.  ... 
doi:10.3390/electronics11132023 fatcat:ic5ytu5nlnfpnhlualafdbcztu

A Review on Evaluation and Configuration of Fault Injection Attack Instruments to Design Attack Resistant MCU-Based IoT Applications

Zahra Kazemi, David Hely, Mahdi Fazeli, Vincent Beroulle
2020 Electronics  
To tackle the issue, various platforms are proposed to enable rapid and easy evaluation against physical attacks.  ...  Two of the primary means of fault attacks are clock and voltage fault injection.  ...  Thereafter, this platform can be used by embedded software developers. This evaluation platform can help them to make their applications robust against low-cost but effective physical attacks.  ... 
doi:10.3390/electronics9071153 fatcat:v7besqcahjgbrbtgndlxglwcuq

Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling [article]

Md Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh
2021 arXiv   pre-print
Our experimental results demonstrate that Stochastic-HMDs offer effective defense against adversarial attacks along with by-product power savings, without requiring any changes to the hardware/software  ...  However, HMDs suffer from adversarial attacks, can be effectively reverse-engineered and subsequently be evaded, allowing malware to hide from detection.  ...  Overhead: We evaluate Stochastic-HMDs software-based implementation overhead against RHMDs.  ... 
arXiv:2103.06936v1 fatcat:wq3rsnkkdvhpnkeqa6szp3v6aq

Efficient Design and Evaluation of Countermeasures against Fault Attacks Using Formal Verification [chapter]

Lucien Goubet, Karine Heydemann, Emmanuelle Encrenaz, Ronald De Keulenaer
2016 Lecture Notes in Computer Science  
Using the tool we developed, we evaluated the robustness of state-of-theart countermeasures against fault injection attacks.  ...  This paper presents a formal verification framework and tool that evaluates the robustness of software countermeasures against faultinjection attacks.  ...  fault at low level (one instruction) and at source level (one C statement).  ... 
doi:10.1007/978-3-319-31271-2_11 fatcat:fy4ebwizwjgbnhjmbdntelup54

Design and Evaluation of Countermeasures Against Fault Injection Attacks and Power Side-Channel Leakage Exploration for AES Block Cipher

F. E. Potestad-Ordonez, E. Tena-Sanchez, A. J. Acosta-Jimenez, C. J. Jimenez-Fernandez, Ricardo Chaves
2022 IEEE Access  
Overall, the proposed DFA countermeasures provide a high fault coverage protection with a low cost in terms of area and power consumption and no PA security degradation.  ...  These allow to detect DFA exploitable faults, from bit to byte level. The proposed solutions have been applied to a T-box based AES block cipher implemented on Field Programmable Gate Array (FPGA).  ...  European Regional Development Fund, EU) through the projects FCT: UIDB/50021/2020 and LISBOA-01-0145-FEDER-031901 (PTDC/CCICOM/31901/2017, HiPErBio) and to Disruptive Sdn seCuRE communicaTIons for eurOpean  ... 
doi:10.1109/access.2022.3183764 fatcat:xshxnuor2rg4da26dh2ybg4fa4

Raksha

Michael Dalton, Hari Kannan, Christos Kozyrakis
2007 Proceedings of the 34th annual international symposium on Computer architecture - ISCA '07  
First, it supports flexible and programmable security policies that enable software to direct hardware analysis towards a wide range of high-level and low-level attacks.  ...  The breadth and diversity of software vulnerabilities demand new security solutions that combine the speed and practicality of hardware approaches with the flexibility and robustness of software systems  ...  This combination allows comprehensive protection against low-level and high-level vulnerabilities.  ... 
doi:10.1145/1250662.1250722 dblp:conf/isca/DaltonKK07 fatcat:6ve3ir4yq5epxh5dkq5oqtmhma

Raksha

Michael Dalton, Hari Kannan, Christos Kozyrakis
2007 SIGARCH Computer Architecture News  
First, it supports flexible and programmable security policies that enable software to direct hardware analysis towards a wide range of high-level and low-level attacks.  ...  The breadth and diversity of software vulnerabilities demand new security solutions that combine the speed and practicality of hardware approaches with the flexibility and robustness of software systems  ...  This combination allows comprehensive protection against low-level and high-level vulnerabilities.  ... 
doi:10.1145/1273440.1250722 fatcat:gdo5x6x7xrdgje3tq44pt6ohxu

Fault-Channel Watermarks [chapter]

Peter Samarin, Alexander Skripnik, Kerstin Lemke-Rust
2016 Lecture Notes in Computer Science  
We introduce a new approach for securing intellectual property in embedded software implementations by using the response of an implementation to fault injections.  ...  A simulator that maps the fault injections to the executed instructions aids an automated characterization of program code.  ...  This work has been supported in parts by the German Federal Ministry of Education and Research (BMBF) through the project De-PlagEmSoft, FKZ 03FH015I3.  ... 
doi:10.1007/978-3-319-45931-8_13 fatcat:e5is3knmovbn7hbwtryggpjwry

Diversity-By-Design for Dependable and Secure Cyber-Physical Systems: A Survey [article]

Qisheng Zhang, Abdullah Zubair Mohammed, Zelin Wan, Jin-Hee Cho, Terrence J. Moore
2020 arXiv   pre-print
; (v) A variety of existing diversity-based approaches based on five different classifications; (vi) The types of attacks mitigated by existing diversity-based approaches; (vii) The overall trends of evaluation  ...  In this work, we are particularly interested in providing an in-depth, comprehensive survey of existing diversity-based approaches, insights, and future work directions for those who want to conduct research  ...  [100] exploited diversity in the implementation of web applications to develop a technique to defend against code injection attacks.  ... 
arXiv:2007.08688v1 fatcat:q5umyoql4nfbfhbjlbdhavu72q

A Comparative Cost/Security Analysis of Fault Attack Countermeasures [chapter]

Tal G. Malkin, François-Xavier Standaert, Moti Yung
2006 Lecture Notes in Computer Science  
For this purpose, we use unified security and efficiency metrics to evaluate various recent protections against fault attacks.  ...  Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption algorithms.  ...  Countermeasures against fault attacks can be deployed in hardware or software and generally help circuits to avoid, detect and/or correct faults.  ... 
doi:10.1007/11889700_15 fatcat:6wzg2hbqr5dlrhzygtmld7wmhe

IPM-RED: combining higher-order masking with robust error detection

Osnat Keren, Ilia Polian
2020 Journal of Cryptographic Engineering  
Cryptographic hardware becomes increasingly vulnerable to physical attacks-both passive side-channel analysis and active fault injections-performed by skillful and well-equipped adversaries.  ...  We prove that our scheme has the same security against side-channel attacks that an earlier, non-robust IPM-based solution has and in addition preserves robustness during addition and multiplication (and  ...  as you give appropriate credit to the original author(s) and the  ... 
doi:10.1007/s13389-020-00229-4 fatcat:23xhnbzsnzhlvdbq5g5lbbwzfi
« Previous Showing results 1 — 15 out of 4,108 results