2013
DOI: 10.1007/978-3-642-40576-1_3
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Laser Fault Injection for Smart Cards Using Security Automata

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
9
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…We identified two previously proposed approaches that use a step counter to protect a code region [48,49]. The former targets computation disruption, whereas the latter combines counters with a signature approach at the assembly code level to ensure tolerance to hardware faults.…”
Section: Code Integrity and Control-flow Securingmentioning
confidence: 99%
“…We identified two previously proposed approaches that use a step counter to protect a code region [48,49]. The former targets computation disruption, whereas the latter combines counters with a signature approach at the assembly code level to ensure tolerance to hardware faults.…”
Section: Code Integrity and Control-flow Securingmentioning
confidence: 99%
“…Basic block signature computations and checks can then be carried out by the virtual machine, as proposed by [18]. A transition automaton, in which each state corresponds to a basic block and each transition corresponds to allowed control flow, can also be built by analyzing the bytecode [10]. Calls to setState(), added to the source code, instruct the virtual machine to check the integrity of the control flow by comparing the current state with the allowed ones according to the automaton.…”
Section: Code Securing and Control Flow Securingmentioning
confidence: 99%
“…Two previously proposed approaches also use a step counter to protect a code region [10,25]. The former targets computation disruption while the latter combined counters with a signature approach at assembly level to ensure tolerance to hardware fault.…”
Section: Code Securing and Control Flow Securingmentioning
confidence: 99%
See 2 more Smart Citations