Title | ||
---|---|---|
From Code Review to Fault Injection Attacks: Filling the Gap Using Fault Model Inference. |
Abstract | ||
---|---|---|
We propose an end-to-end approach to evaluate the robustness of smartcard embedded applications against perturbation attacks. Key to this approach is the fault model inference phase, a method to determine a precise fault model according to the attacked hardware and to the attacker's equipment, taking into account the probability of occurrence of the faults. Together with a fault injection simulator, it allows to compute a predictive metrics, the vulnerability rate, which gives a first estimation of the robustness of the application. Our approach is backed up by experiments and tools that validate its potential for prediction. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1007/978-3-319-31271-2_7 | CARDIS |
Field | DocType | Citations |
Stuck-at fault,Computer security,Inference,Computer science,Smart card,Robustness (computer science),Fault injection,Fault model,Code review,Fault indicator | Conference | 9 |
PageRank | References | Authors |
0.56 | 14 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Louis Dureuil | 1 | 12 | 0.94 |
Marie-Laure Potet | 2 | 190 | 21.34 |
Philippe de Choudens | 3 | 12 | 0.94 |
Cécile Dumas | 4 | 17 | 3.50 |
Jessy Clédière | 5 | 50 | 4.71 |