Applications in secure components (such as smartcards, mobile phones or secure dongles) must be hardened against fault injection to guarantee security even in the presence of a malicious fault. Crafting applications robust against fault injection is an open problem for all actors of the secure application development life cycle, which prompted the development of many simulation tools. A major difficulty for these tools is the absence of representative codes, criteria and metrics to evaluate or compare obtained results. We present FISSC, the first public code collection dedicated to the analysis of code robustness against fault injection attacks. FISSC provides a framework of various robust code implementations and an approach for comparing tools based on predefined attack scenarios.
CITATION STYLE
Dureuil, L., Petiot, G., Potet, M. L., Le, T. H., Crohen, A., & de Choudens, P. (2016). FISSC: A fault injection and simulation secure collection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9922 LNCS, pp. 3–11). Springer Verlag. https://doi.org/10.1007/978-3-319-45477-1_1
Mendeley helps you to discover research relevant for your work.