• Aucun résultat trouvé

Fault-Injection Attacks

Private Circuits II versus Fault Injection Attacks

Private Circuits II versus Fault Injection Attacks

... and fault injections are less accurate: typically, classical injection techniques (clock and power glitches, electromagnetic pulses, ...classical fault injection ...Such fault behaves ...

10

Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA

Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA

... The purpose of this paper is to remedy to these problems. First-order countermeasures have started to be formally studied by Christofi et al. [?], who have been followed by Rauzy & Guilley [?, ?], and Barthe et al. ...

22

Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks

Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks

... Physical fault injections break security functionalities of algorithms by targeting their ...against fault attacks. Exhaustively testing physical fault injections is time con- suming and ...

17

A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA

A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA

... Countermeasures Fault attacks on RSA can be thwarted simply by refraining from implementing the ...a fault injection that would target the ...

23

Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures

Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures

... 2.2 Fault and Combined Attacks In this section we intend to introduce the notions relative to FA and CA. FA and the notion of fault model. Embedded systems are subject to the laws of physics. The ...

19

Fault Injection to Reverse Engineer DES-like Cryptosystems

Fault Injection to Reverse Engineer DES-like Cryptosystems

... Keywords: physical attacks, fault injection attacks, reverse engineering, FIRE, DES-like cryptosystem, s-boxes. 1 Introduction Although Kerckhos' principle [1] enunciates that a cryptosystem ...

18

Using Modular Extension to Provably Protect Edwards Curves Against Fault Attacks

Using Modular Extension to Provably Protect Edwards Curves Against Fault Attacks

... without test in the elliptic curve operation is in Section 5. Section 6 explains the overhead of computation and some examples of our countermeasure. Section 7 concludes. 2 Existing Countermeasures for ECC ...

19

Compilation of a Countermeasure Against Instruction-Skip Fault Attacks

Compilation of a Countermeasure Against Instruction-Skip Fault Attacks

... 5. CONCLUDING REMARKS We presented the use of compilation techniques to effi- ciently automate the application of a software countermea- sure against fault injection attacks based on the instruc- ...

7

Compilation of a Countermeasure Against Instruction-Skip Fault Attacks

Compilation of a Countermeasure Against Instruction-Skip Fault Attacks

... 5. CONCLUDING REMARKS We presented the use of compilation techniques to effi- ciently automate the application of a software countermea- sure against fault injection attacks based on the instruc- ...

7

Electromagnetic fault injection against a System-on-Chip, toward new micro-architectural fault models

Electromagnetic fault injection against a System-on-Chip, toward new micro-architectural fault models

... executed on a same device: the smartphone. They are powered by fast and low-power components, the system-on-chips (SoCs), where a set of modules (modem, graphic and sound card, Flash memory, etc.) takes place on the ...

24

Efficiency of a glitch detector against electromagnetic fault injection

Efficiency of a glitch detector against electromagnetic fault injection

... new fault injection means takes advantage of the presence of the numerous horizontal and vertical loops, in the routing of the power and ground networks, to inject sudden variations of the current flowing ...

7

A Bulk Built-in Sensor for Detection of Fault Attacks

A Bulk Built-in Sensor for Detection of Fault Attacks

... detection, fault attacks, fault tolerance, security, soft errors, transient faults ...malicious fault-based attacks can be used to bypass security mechanisms of secure systems and to ...

5

Practical validation of several fault attacks against the Miller algorithm

Practical validation of several fault attacks against the Miller algorithm

... NOP instructions have been added into the code when the trigger is raised in order to have an easier synchro- nisation between our code and the EM pulse (there is an incompressible delay of 80 ns or about 5 ...

9

Physical functions: the common factor of side-channel and fault attacks?

Physical functions: the common factor of side-channel and fault attacks?

... “physical attacks”. These attacks are generally classified into two categories : fault and side-channel ...such attacks is to propose methods and tools to estimate as soundly as possible, the ...

17

Electromagnetic Fault Injection as a New Forensic Approach for SoCs

Electromagnetic Fault Injection as a New Forensic Approach for SoCs

... Index Terms—Electromagnetic Fault Injection; SoC; Forensic; Smartphones; I. I NTRODUCTION The security of sensitive data stored in integrated circuits ( IC ) can be altered by passive hardware ...

7

Automatic Creation of SQL Injection and Cross-Site Scripting Attacks

Automatic Creation of SQL Injection and Cross-Site Scripting Attacks

... A’s taint propagation is unique in that it tracks the flow of tainted data through the database. When tainted data is stored in the database, the taint information is stored with it. When the data is later ...

13

Improving Web Application Firewalls to detect advanced SQL injection attacks

Improving Web Application Firewalls to detect advanced SQL injection attacks

... SQL injection are the most prevalent security threats affecting Web ...these attacks, Web Application Firewalls (WAFs) apply security rules in order to both inspect HTTP data streams and detect malicious ...

7

Simulating and modeling the effects of laser fault injection on integrated circuits

Simulating and modeling the effects of laser fault injection on integrated circuits

... Laser fault injections induce transient faults into IC s by locally generating tran- sient currents that temporarily flip the outputs of the illuminated ...Laser fault injection can be anticipated or ...

155

Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also Vulnerable

Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also Vulnerable

... injecting fault and corresponding coun- termeasures, works appear now about the need for protecting RSA public elements against fault ...This fault model is justified here by a complete study of ...

19

From safety analysis to experimental validation by fault injection - Case of automotive embedded systems

From safety analysis to experimental validation by fault injection - Case of automotive embedded systems

... that fault injection should be used in the development ...of fault injection in the design phase, which is, as far as we know, a difficult problem that has not been investigated ...

147

Show all 1200 documents...

Sujets connexes