2018
DOI: 10.1007/s41635-018-0038-1
|View full text |Cite
|
Sign up to set email alerts
|

Fault Attacks on Secure Embedded Software: Threats, Design, and Evaluation

Abstract: Embedded software is developed under the assumption that hardware execution is always correct. Fault attacks break and exploit that assumption. Through the careful introduction of targeted faults, an adversary modifies the controlflow or data-flow integrity of software. The modified program execution is then analyzed and used as a source of information leakage, or as a mechanism for privilege escalation. Due to the increasing complexity of modern embedded systems, and due to the difficulty of guaranteeing corr… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
45
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 65 publications
(49 citation statements)
references
References 85 publications
0
45
0
Order By: Relevance
“…In [26,42] the authors present a survey of the different hardware based approach techniques used to inject a fault. The authors also refer to relevant works where the various fault injection techniques are used.…”
Section: Hardware Based Approachmentioning
confidence: 99%
“…In [26,42] the authors present a survey of the different hardware based approach techniques used to inject a fault. The authors also refer to relevant works where the various fault injection techniques are used.…”
Section: Hardware Based Approachmentioning
confidence: 99%
“…The first property of out-of-band signal injection attacks is that they aim to change values processed by a system, rather than infer them. This fact distinguishes them from the side-channel [1] and fault-injection attacks [2]- [4] mentioned in the introduction.…”
Section: A Survey Scopementioning
confidence: 95%
“…This set contains recent studies whose novelty and potential has not yet received mainstream attention. 4 For example, the techniques proposed by Tu et al to overcome ADC sampling rate drifts should be applicable to other methods of injection, and against different types of targets. We place the work by Bolton et al [12] in the same category, as it managed to bridge research on HDD attacks (e.g., [53]) with attacks on MEMS sensors, and contained significant insights into why resonance attacks against hard drives work.…”
Section: Acoustic Emanationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Faults can be induced into the chip by using physical perturbations in its execution environment. Several techniques have been successfully demonstrated in the literature [4], [32], [47], [62]. Commonly used ones include:…”
Section: The Conceptmentioning
confidence: 99%