In the area of physical attacks, system-on-chip (SoC) designs have not received the same level of attention as simpler micro-controllers. We try to model the behavior of secure software running on a superscalar out-of-order microprocessor typical of more complex SoC, in the presence of electromagnetic (EM) pulses. We first show that it is possible, in a black box approach, to corrupt the loop iteration count of both original and hardened versions of two sensitive loops. We propose a characterization methodology based on very simple codes, to understand and classify the fault effects at the level of the instruction set architecture (ISA). The resulting classification includes the well established instruction skip and register corruption mode...
International audienceImplementation attacks are a major threat to hardware cryptographic implementa...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
Special Issue: Trustworthy Manufacturing and Utilization of Secure DevicesInternational audienceTh...
In the area of physical attacks, system-on-chip (SoC) designs have not received the same level of at...
International audienceIn the area of physical attacks, system-on-chip (SoC) designs have not receive...
Electromagnetic fault injection (EMFI) is a well known technique used to disturb the behaviour of a ...
International audienceInjection of transient faults can be used as a way to attack embedded systems....
International audienceRecently, several Fault Attacks (FAs) which target modern Central Processing U...
International audienceThe last years have seen the emergence of fault attacks targeting modern centr...
Hardware and software of secured embedded systems are prone to physical attacks. In particular, faul...
International audienceA fault attack is a well-known technique where the behaviour of a chip is volu...
International audienceThe purpose of this work is to define an assembly-level fault model for electr...
Short version of the article "Experimental evaluation of two software countermeasures against fault ...
International audienceImplementation attacks are a major threat to hardware cryptographic implementa...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
Special Issue: Trustworthy Manufacturing and Utilization of Secure DevicesInternational audienceTh...
In the area of physical attacks, system-on-chip (SoC) designs have not received the same level of at...
International audienceIn the area of physical attacks, system-on-chip (SoC) designs have not receive...
Electromagnetic fault injection (EMFI) is a well known technique used to disturb the behaviour of a ...
International audienceInjection of transient faults can be used as a way to attack embedded systems....
International audienceRecently, several Fault Attacks (FAs) which target modern Central Processing U...
International audienceThe last years have seen the emergence of fault attacks targeting modern centr...
Hardware and software of secured embedded systems are prone to physical attacks. In particular, faul...
International audienceA fault attack is a well-known technique where the behaviour of a chip is volu...
International audienceThe purpose of this work is to define an assembly-level fault model for electr...
Short version of the article "Experimental evaluation of two software countermeasures against fault ...
International audienceImplementation attacks are a major threat to hardware cryptographic implementa...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
Special Issue: Trustworthy Manufacturing and Utilization of Secure DevicesInternational audienceTh...