Instruction duplication: Leaky and not too fault-tolerant!

12Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Fault injection attacks alter the intended behavior of micro-controllers, compromising their security. These attacks can be mitigated using software countermeasures. A widely-used software-based solution to deflect fault attacks is instruction duplication and n -plication. We explore two main limitations with these approaches: first, we examine the effect of instruction duplication under fault attacks, demonstrating that as fault tolerance mechanism, code duplication does not provide a strong protection in practice. Second, we show that instruction duplication increases side-channel leakage of sensitive code regions using a multivariate exploitation technique both in theory and in practice.

Cite

CITATION STYLE

APA

Cojocar, L., Papagiannopoulos, K., & Timmers, N. (2018). Instruction duplication: Leaky and not too fault-tolerant! In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10728 LNCS, pp. 160–179). Springer Verlag. https://doi.org/10.1007/978-3-319-75208-2_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free