2017 IEEE Trustcom/BigDataSE/Icess 2017
DOI: 10.1109/trustcom/bigdatase/icess.2017.250
|View full text |Cite
|
Sign up to set email alerts
|

An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT

Abstract: Recently fault injection has increasingly been used both to attack software applications, and to test system robustness. Detecting fault injection vulnerabilities has been approached with a variety of different but limited methods. This paper proposes a general process without these limitations that uses model checking to detect fault injection vulnerabilities in binaries. The efficacy of this process is demonstrated by detecting vulnerabilities in the PRESENT binary.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
36
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 16 publications
(36 citation statements)
references
References 30 publications
0
36
0
Order By: Relevance
“…This section discusses the process used to detect fault injection vulnerabilities. In the earlier work, a simpler version of this process was presented, and here, a pre‐analysis step is added that improves efficiency.…”
Section: Processmentioning
confidence: 99%
See 4 more Smart Citations
“…This section discusses the process used to detect fault injection vulnerabilities. In the earlier work, a simpler version of this process was presented, and here, a pre‐analysis step is added that improves efficiency.…”
Section: Processmentioning
confidence: 99%
“…However, most aspects of the process do not rely upon this choice, and future work is to be able to start directly from the binary. For further discussion, refer to the earlier work …”
Section: Processmentioning
confidence: 99%
See 3 more Smart Citations