2013 Workshop on Fault Diagnosis and Tolerance in Cryptography 2013
DOI: 10.1109/fdtc.2013.9
|View full text |Cite
|
Sign up to set email alerts
|

Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller

Abstract: Abstract-Injection of transient faults as a way to attack cryptographic implementations has been largely studied in the last decade. Several attacks that use electromagnetic fault injection against hardware or software architectures have already been presented. On microcontrollers, electromagnetic fault injection has mostly been seen as a way to skip assembly instructions or subroutine calls. However, to the best of our knowledge, no precise study about the impact of an electromagnetic glitch fault injection o… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

2
132
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 155 publications
(134 citation statements)
references
References 26 publications
2
132
0
Order By: Relevance
“…The replacement of a whole instruction by a jump at any location of the program. The executed instruction becomes a jump to an unexpected target [9,24]. The same effect is obtained if the target address of a jump is changed by corrupting the instruction encoding or, in case of indirect jump, if computation of the target address is disrupted.…”
Section: Fault Modelsmentioning
confidence: 69%
See 3 more Smart Citations
“…The replacement of a whole instruction by a jump at any location of the program. The executed instruction becomes a jump to an unexpected target [9,24]. The same effect is obtained if the target address of a jump is changed by corrupting the instruction encoding or, in case of indirect jump, if computation of the target address is disrupted.…”
Section: Fault Modelsmentioning
confidence: 69%
“…For example, electromagnetic pulse injections can induce a clock glitch on the bus during transmission of instruction from the Flash memory resulting in an instruction replacement [24]. Such an instruction replacement can provoke a control flow disruption in the two following cases:…”
Section: Fault Modelsmentioning
confidence: 99%
See 2 more Smart Citations
“…However, they are more vulnerable to FA [10] [11] [12] compared to cryptographic chips. In fact, the latter have a specific architecture with specifically designed countermeasures to FA.…”
Section: A Fault Injection Attacks On Microcontrollersmentioning
confidence: 99%