During this thesis, we focused on the security of mobile devices. To do this, we explored physical attacks by perturbation (fault injections) as well as by observation, both based on electromagnetic emissions. We selected two types of targets representing two categories of mobile devices. On the one hand, the microcontrollers that equip IoT devices. And on the other hand the System-on-Chip (SoC) that can be found on smartphones. We focused on the chips designed by ARM. Through physical attacks we wanted to show that it was possible to affect the microarchitecture on which the entire functioning of these systems is based. All the protections that can be implemented later at the software level are based on the microarchitecture and therefore ...
Les smartphones et les tablettes sont devenus des outils presque incontournables dans la vie de tout...
Embedded systems are ubiquitous and they have more and more applications. Most actual industrial fie...
The landscape of mobile devices has been changed with the introduction of smartphones. Sincetheir ad...
During this thesis, we focused on the security of mobile devices. To do this, we explored physical a...
Physical attacks by injection of faults by electromagnetic perturbations have the particularity of i...
Embedded devices are currently used in many critical systems, ranging from automotive to medical dev...
Today, security of embedded devices is put in the limelight with the increasing market share of both...
Since the democratization of mobile devices, sensitive operations likepayment, identification or hea...
International audienceA fault attack is a well-known technique where the behaviour of a chip is volu...
Nowadays, in order to provide secure, reliable and performant services (e.g: mobile payments, agenda...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
The costs and damages that result from cyber security weaknesses are increasing year by year. The cy...
General use products as mobile phones or smartcards manipulate confidential data. As such, the circu...
Les attaques par injection de faute représentent une menace considérable pour les systèmes cyber-phy...
Les smartphones et les tablettes sont devenus des outils presque incontournables dans la vie de tout...
Embedded systems are ubiquitous and they have more and more applications. Most actual industrial fie...
The landscape of mobile devices has been changed with the introduction of smartphones. Sincetheir ad...
During this thesis, we focused on the security of mobile devices. To do this, we explored physical a...
Physical attacks by injection of faults by electromagnetic perturbations have the particularity of i...
Embedded devices are currently used in many critical systems, ranging from automotive to medical dev...
Today, security of embedded devices is put in the limelight with the increasing market share of both...
Since the democratization of mobile devices, sensitive operations likepayment, identification or hea...
International audienceA fault attack is a well-known technique where the behaviour of a chip is volu...
Nowadays, in order to provide secure, reliable and performant services (e.g: mobile payments, agenda...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
The costs and damages that result from cyber security weaknesses are increasing year by year. The cy...
General use products as mobile phones or smartcards manipulate confidential data. As such, the circu...
Les attaques par injection de faute représentent une menace considérable pour les systèmes cyber-phy...
Les smartphones et les tablettes sont devenus des outils presque incontournables dans la vie de tout...
Embedded systems are ubiquitous and they have more and more applications. Most actual industrial fie...
The landscape of mobile devices has been changed with the introduction of smartphones. Sincetheir ad...