A tool assisted methodology to harden programs against multi-faults injections

03/03/2023
by   Etienne Boespflug, et al.
0

Fault attacks consist in changing the program behavior by injecting faults at run-time in order to break some expected security properties. Applications are hardened against fault attack adding countermeasures. According to the state of the art, applications must now be protected against multi-fault injection. As a consequence developing applications which are robust becomes a very challenging task, in particular because countermeasures can be also the target of attacks. The aim of this paper is to propose an assisted methodology for developers allowing to harden an application against multi-fault attacks, addressing several aspects: how to identify which parts of the code should be protected and how to choose the most appropriate countermeasures, making the application more robust and avoiding useless runtime checks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/02/2022

SCFI: State Machine Control-Flow Hardening Against Fault Attacks

Fault injection (FI) is a powerful attack methodology allowing an advers...
research
02/14/2023

Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M

Voltage Fault Injection (VFI), also known as power glitching, has proven...
research
10/25/2019

Electromagnetic fault injection against a System-on-Chip, toward new micro-architectural fault models

Electromagnetic fault injection (EMFI) is a well known technique used to...
research
06/09/2022

AFIA: ATPG-Guided Fault Injection Attack on Secure Logic Locking

The outsourcing of the design and manufacturing of integrated circuits h...
research
09/05/2023

MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks

Fault injection attacks represent an effective threat to embedded system...
research
07/19/2019

Stronger and Faster Side-Channel Protections for CSIDH

CSIDH is a recent quantum-resistant primitive based on the difficulty of...
research
07/07/2019

Detecting Fault Injection Attacks with Runtime Verification

Fault injections are increasingly used to attack secure applications. So...

Please sign up or login with your details

Forgot password? Click here to reset