Automatic application of software countermeasures against physical attacks

3Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

While the number of embedded systems is continuously increasing, securing software against physical attacks is costly and error-prone. Several works proposed solutions that automatically insert protections against these attacks in order to reduce this cost and this risk of error. In this chapter, we present a survey of existing approaches and classify them by the level at which they apply the countermeasure. We consider three different levels: the source code level, the compilation level, and the assembly/binary level. We explain the advantages and disadvantages of each level considering different criteria. Finally, we encourage future works to take compilation into account when designing tools, to consider the problem of combining countermeasures, as well as the interactions between countermeasures and compiler optimisations. Going one step further, we encourage future works to imagine how compilation could be modified or redesigned to optimise both performance and security.

Cite

CITATION STYLE

APA

Belleville, N., Heydemann, K., Couroussé, D., Barry, T., Robisson, B., Seriai, A., & Charles, H. P. (2018). Automatic application of software countermeasures against physical attacks. In Cyber-Physical Systems Security (pp. 135–155). Springer International Publishing. https://doi.org/10.1007/978-3-319-98935-8_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free