International audienceA fault attack is a well-known technique where the behaviour of a chip is voluntarily disturbed by hardware means in order to undermine the security of the information handled by the target. In this paper, we explore how Electromagnetic fault injection (EMFI) can be used to create vulnerabilities in sound software, targeting a Cortex-M3 microcontroller. Several use-cases are shown experimentally: control flow hijacking, buffer overflow (even with the presence of a canary), covert backdoor insertion and Return Oriented Programming can be achieved even if programs are not vulnerable in a software point of view. These results suggest that the protection of any software against vulnerabilities must take hardware into accou...
Short version of the article "Experimental evaluation of two software countermeasures against fault ...
Fault injection is a well known method to test the robustness and security vulnerabilities of softwa...
© 2017 IEEE. Security is acknowledged as one of the main challenges in the design and deployment of ...
International audienceA fault attack is a well-known technique where the behaviour of a chip is volu...
Hardware and software of secured embedded systems are prone to physical attacks. In particular, faul...
Electromagnetic fault injection (EMFI) is a well known technique used to disturb the behaviour of a ...
International audienceThe purpose of this work is to define an assembly-level fault model for electr...
EMFI has become a popular fault injection (FI) technique due to its ability to inject faults precise...
International audienceThe last years have seen the emergence of fault attacks targeting modern centr...
In the area of physical attacks, system-on-chip (SoC) designs have not received the same level of at...
Fault injection attack against embedded devices has attracted much attention in recent years. As a h...
Security is acknowledged as one of the main challenges in the design and deployment of embedded circ...
International audienceInjection of transient faults can be used as a way to attack embedded systems....
10 pagesInternational audienceInjection of transient faults as a way to attack cryptographic impleme...
Presented on October 28, 2016 at 12:00 p.m. in the Pettit Microelectronics Research Building, MIRC R...
Short version of the article "Experimental evaluation of two software countermeasures against fault ...
Fault injection is a well known method to test the robustness and security vulnerabilities of softwa...
© 2017 IEEE. Security is acknowledged as one of the main challenges in the design and deployment of ...
International audienceA fault attack is a well-known technique where the behaviour of a chip is volu...
Hardware and software of secured embedded systems are prone to physical attacks. In particular, faul...
Electromagnetic fault injection (EMFI) is a well known technique used to disturb the behaviour of a ...
International audienceThe purpose of this work is to define an assembly-level fault model for electr...
EMFI has become a popular fault injection (FI) technique due to its ability to inject faults precise...
International audienceThe last years have seen the emergence of fault attacks targeting modern centr...
In the area of physical attacks, system-on-chip (SoC) designs have not received the same level of at...
Fault injection attack against embedded devices has attracted much attention in recent years. As a h...
Security is acknowledged as one of the main challenges in the design and deployment of embedded circ...
International audienceInjection of transient faults can be used as a way to attack embedded systems....
10 pagesInternational audienceInjection of transient faults as a way to attack cryptographic impleme...
Presented on October 28, 2016 at 12:00 p.m. in the Pettit Microelectronics Research Building, MIRC R...
Short version of the article "Experimental evaluation of two software countermeasures against fault ...
Fault injection is a well known method to test the robustness and security vulnerabilities of softwa...
© 2017 IEEE. Security is acknowledged as one of the main challenges in the design and deployment of ...