FISSC: A fault injection and simulation secure collection

35Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Applications in secure components (such as smartcards, mobile phones or secure dongles) must be hardened against fault injection to guarantee security even in the presence of a malicious fault. Crafting applications robust against fault injection is an open problem for all actors of the secure application development life cycle, which prompted the development of many simulation tools. A major difficulty for these tools is the absence of representative codes, criteria and metrics to evaluate or compare obtained results. We present FISSC, the first public code collection dedicated to the analysis of code robustness against fault injection attacks. FISSC provides a framework of various robust code implementations and an approach for comparing tools based on predefined attack scenarios.

Cite

CITATION STYLE

APA

Dureuil, L., Petiot, G., Potet, M. L., Le, T. H., Crohen, A., & de Choudens, P. (2016). FISSC: A fault injection and simulation secure collection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9922 LNCS, pp. 3–11). Springer Verlag. https://doi.org/10.1007/978-3-319-45477-1_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free