Combining high-level and low-level approaches to evaluate software implementations robustness against multiple fault injection attacks

7Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Physical fault injections break security functionalities of algorithms by targeting their implementations. Software techniques strengthen such implementations to enhance their robustness against fault attacks. Exhaustively testing physical fault injections is time consuming and requires complex platforms. Simulation solutions are developed for this specific purpose. We chose two independent tools presented in 2014, the Laser Attack Robustness (Lazart) and the Embedded Fault Simulator (EFS) in order to evaluate software implementations against multiple fault injection attacks. Lazart and the EFS share the common goal that consists in detecting vulnerabilities in the code. However, they operate with different techniques, fault models and abstraction levels. This paper aims at exhibiting specific advantages of both approaches and proposes a combining scheme that emphasizes their complementary nature.

Cite

CITATION STYLE

APA

Riviére, L., Potet, M. L., Le, T. H., Bringer, J., Chabanne, H., & Puys, M. (2015). Combining high-level and low-level approaches to evaluate software implementations robustness against multiple fault injection attacks. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8930, 92–111. https://doi.org/10.1007/978-3-319-17040-4_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free