2016
DOI: 10.1007/978-3-319-31271-2_10
|View full text |Cite
|
Sign up to set email alerts
|

Protecting the Control Flow of Embedded Processors against Fault Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
36
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 18 publications
(36 citation statements)
references
References 8 publications
0
36
0
Order By: Relevance
“…Control-flow integrity has been widely studied since the seminal work of Abadi et al [19], in various contexts of threat, and is still currently a hot topic of research [20,21,22,23]. As we focus on a smart card subject to physical attacks, it induces a specific attacker model and requires specific solutions.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Control-flow integrity has been widely studied since the seminal work of Abadi et al [19], in various contexts of threat, and is still currently a hot topic of research [20,21,22,23]. As we focus on a smart card subject to physical attacks, it induces a specific attacker model and requires specific solutions.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, a control-flow attack that leads to the execution of only a subpart of a basic block will be detected. Several solutions based on dedicated hardware have been proposed [42,43,44,21,20]. Although they have a lower overhead, they require hardware modifications, and thus, are impractical for smart cards based on off-the-shelf hardware.…”
Section: Code Integrity and Control-flow Securingmentioning
confidence: 99%
“…Another common approach to enforce CFI is to augment the processor with hardware monitors [7], [33], [43]. Typically, these monitors continuously check that the processor behaves as expected and raise an alert when an error is observed.…”
Section: Related Workmentioning
confidence: 99%
“…CFI protection schemes [1] typically protect the execution of code against software attacks. However, recent work extends these countermeasures in the context of fault attacks, where they try to protect the sequence of basic blocks or even the sequence of instructions [10], [19], [23].…”
Section: A Code Protection With Control-flow Integritymentioning
confidence: 99%
“…We included all transformations to the LLVM compiler ( Figure 3) and evaluated this scheme using an ARMv7-M instruction set architecture (ISA) simulator. We use a software-centered GPSA CFI scheme similar to the one in [23]. The branch protection is purely implemented in software and does not require hardware modifications.…”
Section: Implementation and Evaluationmentioning
confidence: 99%