Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities

03/07/2023
by   Guilhem Lacombe, et al.
0

Certification through auditing allows to ensure that critical embedded systems are secure. This entails reviewing their critical components and checking for dangerous execution paths. This latter task requires the use of specialized tools which allow to explore and replay executions but are also difficult to use effectively within the context of the audit, where time and knowledge of the code are limited. Fault analysis is especially tricky as the attacker may actively influence execution, rendering some common methods unusable and increasing the number of possible execution paths exponentially. In this work, we present a new method which mitigates these issues by reducing the number of fault injection points considered to only the most relevant ones relatively to some security properties. We use fast and robust static analysis to detect injection points and assert their impactfulness. A more precise dynamic/symbolic method is then employed to validate attack paths. This way the insight required to find attacks is reduced and dynamic methods can better scale to realistically sized programs. Our method is implemented into a toolchain based on Frama-C and KLEE and validated on WooKey, a case-study proposed by the National Cybersecurity Agency of France.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/24/2020

Accelerating Transient Fault Injection Campaigns by using Dynamic HDL Slicing

Along with the complexity of electronic systems for safety-critical appl...
research
11/24/2022

Specognitor: Identifying Spectre Vulnerabilities via Prediction-Aware Symbolic Execution

Spectre attacks exploit speculative execution to leak sensitive informat...
research
01/09/2020

Voltage regulator assisted lightweight countermeasure against fault injection attacks

The impeccable design of sensitive and cryptographic circuits (CC) again...
research
01/24/2020

Efficient Fault Injection based on Dynamic HDL Slicing Technique

This work proposes a fault injection methodology where Hardware Descript...
research
08/13/2021

The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs

Voltage fault injection (FI) is a well-known attack technique that can b...
research
04/02/2018

Using Unit Testing to Detect Sanitization Flaws

Input sanitization mechanisms are widely used to mitigate vulnerabilitie...
research
10/14/2022

AFETM: Adaptive function execution trace monitoring for fault diagnosis

The high tracking overhead, the amount of up-front effort required to se...

Please sign up or login with your details

Forgot password? Click here to reset