International audienceIn the area of physical attacks, system-on-chip (SoC) designs have not received the same level of attention as simpler micro-controllers. We try to model the behavior of secure software running on a superscalar out-of-order microprocessor typical of more complex SoC, in the presence of electromagnetic (EM) pulses. We first show that it is possible, in a black box approach, to corrupt the loop iteration count of both original and hardened versions of two sensitive loops. We propose a characterization methodology based on very simple codes, to understand and classify the fault effects at the level of the instruction set architecture (ISA). The resulting classification includes the well established instruction skip and re...
Hardware and software of secured embedded systems are prone to physical attacks. In particular, faul...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
International audienceImplementation attacks are a major threat to hardware cryptographic implementa...
International audienceIn the area of physical attacks, system-on-chip (SoC) designs have not receive...
In the area of physical attacks, system-on-chip (SoC) designs have not received the same level of at...
Electromagnetic fault injection (EMFI) is a well known technique used to disturb the behaviour of a ...
International audienceInjection of transient faults can be used as a way to attack embedded systems....
International audienceRecently, several Fault Attacks (FAs) which target modern Central Processing U...
International audienceThe last years have seen the emergence of fault attacks targeting modern centr...
International audienceA fault attack is a well-known technique where the behaviour of a chip is volu...
Short version of the article "Experimental evaluation of two software countermeasures against fault ...
International audienceThe purpose of this work is to define an assembly-level fault model for electr...
Hardware and software of secured embedded systems are prone to physical attacks. In particular, faul...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
International audienceImplementation attacks are a major threat to hardware cryptographic implementa...
International audienceIn the area of physical attacks, system-on-chip (SoC) designs have not receive...
In the area of physical attacks, system-on-chip (SoC) designs have not received the same level of at...
Electromagnetic fault injection (EMFI) is a well known technique used to disturb the behaviour of a ...
International audienceInjection of transient faults can be used as a way to attack embedded systems....
International audienceRecently, several Fault Attacks (FAs) which target modern Central Processing U...
International audienceThe last years have seen the emergence of fault attacks targeting modern centr...
International audienceA fault attack is a well-known technique where the behaviour of a chip is volu...
Short version of the article "Experimental evaluation of two software countermeasures against fault ...
International audienceThe purpose of this work is to define an assembly-level fault model for electr...
Hardware and software of secured embedded systems are prone to physical attacks. In particular, faul...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
International audienceImplementation attacks are a major threat to hardware cryptographic implementa...