Fault injection attacks alter the intended behavior of micro-controllers, compromising their security. These attacks can be mitigated using software countermeasures. A widely-used software-based solution to deflect fault attacks is instruction duplication and n -plication. We explore two main limitations with these approaches: first, we examine the effect of instruction duplication under fault attacks, demonstrating that as fault tolerance mechanism, code duplication does not provide a strong protection in practice. Second, we show that instruction duplication increases side-channel leakage of sensitive code regions using a multivariate exploitation technique both in theory and in practice
A Fault Attack (FA) is performed mainly under the data corruption model and poses a threat to securi...
Modern processors continue to aggressively scale down the feature size and reduce voltage levels to ...
In this paper we present software countermeasures specifically designed to counteract fault injectio...
Fault injection attacks alter the intended behavior of micro- controllers, compromising their securi...
Code diversification has been proposed as a technique to mitigate code reuse attacks, which have rec...
Despite the large number of proposed countermeasures against control-flow hijacking attacks, these a...
Recently, several software encoding countermeasures were proposed, utilizing the side-channel hiding...
Abstract. Despite the large number of proposed countermeasures against control-flow hijacking attack...
International audienceMany fault injection techniques have been proposed in the recent years to atta...
16 pages. Please contact the authors to get the pre-proceedings version.International audienceFault ...
Abstract—The number and complexity of attacks on computer systems are increasing. This growth necess...
Short version of the article "Experimental evaluation of two software countermeasures against fault ...
International audienceWith the increasing complexity of digital applications, the use of variable-le...
International audiencePhysical attacks especially fault attacks represent one themajor threats again...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
A Fault Attack (FA) is performed mainly under the data corruption model and poses a threat to securi...
Modern processors continue to aggressively scale down the feature size and reduce voltage levels to ...
In this paper we present software countermeasures specifically designed to counteract fault injectio...
Fault injection attacks alter the intended behavior of micro- controllers, compromising their securi...
Code diversification has been proposed as a technique to mitigate code reuse attacks, which have rec...
Despite the large number of proposed countermeasures against control-flow hijacking attacks, these a...
Recently, several software encoding countermeasures were proposed, utilizing the side-channel hiding...
Abstract. Despite the large number of proposed countermeasures against control-flow hijacking attack...
International audienceMany fault injection techniques have been proposed in the recent years to atta...
16 pages. Please contact the authors to get the pre-proceedings version.International audienceFault ...
Abstract—The number and complexity of attacks on computer systems are increasing. This growth necess...
Short version of the article "Experimental evaluation of two software countermeasures against fault ...
International audienceWith the increasing complexity of digital applications, the use of variable-le...
International audiencePhysical attacks especially fault attacks represent one themajor threats again...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
A Fault Attack (FA) is performed mainly under the data corruption model and poses a threat to securi...
Modern processors continue to aggressively scale down the feature size and reduce voltage levels to ...
In this paper we present software countermeasures specifically designed to counteract fault injectio...