2015
DOI: 10.1007/978-3-319-17040-4_7
|View full text |Cite
|
Sign up to set email alerts
|

Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks

Abstract: International audiencePhysical fault injections break security functionalities of algorithms by targeting their implementations. Software techniques strengthen such implementations to enhance their robustness against fault attacks. Exhaustively testing physical fault injections is time consuming and requires complex platforms. Simulation solutions are developed for this specific purpose. We chose two independent tools presented in 2014, the Laser Attack Robustness (Lazart) and the Embedded Fault Simulator (EFS… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
17
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 14 publications
(20 citation statements)
references
References 13 publications
1
17
0
Order By: Relevance
“…In [32] the authors propose combining the Lazart process with the Embedded Fault Simulator (EFS) [6]. This extends from the capabilities of Lazart alone by adding lower level fault injection analysis that is also embedded in the chip with the program.…”
Section: Software Based Approachmentioning
confidence: 99%
“…In [32] the authors propose combining the Lazart process with the Embedded Fault Simulator (EFS) [6]. This extends from the capabilities of Lazart alone by adding lower level fault injection analysis that is also embedded in the chip with the program.…”
Section: Software Based Approachmentioning
confidence: 99%
“…However, to validate the experiments, a manual fault injection of setting the loop bound value to 10 was tested and found to be CA vulnerable with the process . 3 3 3 3 3 3 3 3 3 3 2 3 3 3 2 3 3 3 3 3 3 3 3 3 3 3 No Fault The works of Rivière et al, 12 Potet et al, 19 and Pattabiraman et al 33 all have similar proposals to the process here, albeit in more limited manners.…”
Section: Speck Vulnerabilitiesmentioning
confidence: 52%
“…The strengths of this approach include the following. By operating directly upon the binary, fault injection vulnerabilities that cannot be detected in source languages or intermediate representations can be detected . Formal methods, model checking here, ensure the rigor of the analysis and so ensure that fault injection vulnerabilities that are detected are real and not false positives.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations