2004
DOI: 10.1007/1-4020-8147-2_11
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Fault Attacks

Abstract: Fault attacks described in cryptographic papers mostly apply to cryptographic algorithms‚ yet such attacks may have an impact on the whole system in a smart card. In this paper‚ we describe what can be achieved nowadays by using fault attacks in a smart card environment. After studying several ways of inducing faults‚ we describe attacks on the most popular cryptosystems and we discuss the problem of induced perturbations in the smart card environment. Finally we discuss how to find appropriate software counte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
59
0

Year Published

2006
2006
2016
2016

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 94 publications
(59 citation statements)
references
References 22 publications
0
59
0
Order By: Relevance
“…Since such a disturbance can be achieved thanks to a fault injection [13], the attacker can run within her own applet a method trying to store the reference of the APDU buffer array into a global array and disturb the conditional branching execution to avoid the SecurityException.…”
Section: Listing 11 Detection Of Apdu Buffer Storage Attempt In Putmentioning
confidence: 99%
“…Since such a disturbance can be achieved thanks to a fault injection [13], the attacker can run within her own applet a method trying to store the reference of the APDU buffer array into a global array and disturb the conditional branching execution to avoid the SecurityException.…”
Section: Listing 11 Detection Of Apdu Buffer Storage Attempt In Putmentioning
confidence: 99%
“…Known fault attacks against exponentiation-based cryptosystems assume pretty strong fault models (see [11], [12] for recent surveys). One exception are the skipping attacks due to Schmidt and Herbst against RSA.…”
Section: Skipping Attacksmentioning
confidence: 99%
“…To achieve a resistant implementation, well-known countermeasures could be inserted, like execution flow controls, doubling sensitive operations and checking their coherency, variable redundancies, etc (cf. [8]). In the context of our attacks, the checkcast bytecode should then be considered as sensitive and handled accordingly.…”
Section: Security Concernsmentioning
confidence: 99%
“…Although fault attacks have been mainly used in the literature from a cryptanalytic angle [2,6,3], their strength is to potentially stress every code layers embedded in a device. Practical details and comprehensive consequences could be found in [8].…”
Section: Introductionmentioning
confidence: 99%