Abstract | ||
---|---|---|
Although multi-fault attacks are extremely powerful in defeating sophisticated hardware and software defences, detecting and exploiting such attacks remains a difficult problem, especially without any prior knowledge of the target. Our main contribution is an end-to-end approach for multi-fault attack vulnerability assessment We take advantage of target specific fault models rather than generic fault models to achieve complex multi-fault attacks that can lead to critical vulnerabilities. Target specific fault models are generated thanks to fault models inference process, based on a fault injections simulation and a characterization, in order to elaborate powerful multi-fault attacks based on different fault models. Combining fault models opens up new possible attack paths and adds flexibility to design fault attacks that adapt to countermeasures. Hence, the direct consequence of the increasing complexity of fault attacks question the effectiveness of software countermeasures based on generic fault models for sensitive applications. |
Year | DOI | Venue |
---|---|---|
2020 | 10.1109/FDTC51366.2020.00009 | 2020 Workshop on Fault Detection and Tolerance in Cryptography (FDTC) |
Keywords | DocType | ISBN |
Multi-Fault Attack,Fault Injection Simulation,Laser Fault Injection,Microcontroller | Conference | 978-1-7281-9563-6 |
Citations | PageRank | References |
0 | 0.34 | 7 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Vincent Werner | 1 | 0 | 0.34 |
Laurent Maingault | 2 | 0 | 0.34 |
Marie-Laure Potet | 3 | 190 | 21.34 |