International audienceMany fault injection techniques have been proposed in the recent years to attack computing systems, as well as the corresponding countermeasures. Most of published attacks are limited to one or a few faults. We provide a theoretical analysis of instruction skip attacks to show how an attacker can modify an application behavior at run-time when thousands of instruction skips are possible. Our main result is that instruction skip is Turing-complete under our theoretical model while requiring the presence of only common instructions in the binary. As a consequence, we show that current software-based countermeasures are fragile. In addition, we release a modification of gem5 that implements a classical instruction skip fa...
Faults attacks are a serious threat to secure devices, because they are powerful and they can be per...
Cryptographic implementations are often vulnerable against physical attacks, fault injection analysi...
A fundamental assumption in software security is that memory contents do not change unless there is ...
International audienceMany fault injection techniques have been proposed in the recent years to atta...
16 pages. Please contact the authors to get the pre-proceedings version.International audienceFault ...
Fault injection attacks alter the intended behavior of micro-controllers, compromising their securit...
Fault injection attacks alter the intended behavior of micro- controllers, compromising their securi...
International audiencePhysical attacks especially fault attacks represent one the major threats agai...
A Fault Attack (FA) is performed mainly under the data corruption model and poses a threat to securi...
International audienceMicrocontrollers storing valuable data or using security functions are vulnera...
Most of the attacks against the Advanced Encryption Standard based on faults mainly aim at either al...
In this paper we present software countermeasures specifically designed to counteract fault injectio...
Current taint checking architectures monitor tainted data usage mainly with control transfer instruc...
We describe a new, general approach for safeguarding systems against any type of code-injection atta...
International audienceFault injection is a well known method to test the robustness and security vul...
Faults attacks are a serious threat to secure devices, because they are powerful and they can be per...
Cryptographic implementations are often vulnerable against physical attacks, fault injection analysi...
A fundamental assumption in software security is that memory contents do not change unless there is ...
International audienceMany fault injection techniques have been proposed in the recent years to atta...
16 pages. Please contact the authors to get the pre-proceedings version.International audienceFault ...
Fault injection attacks alter the intended behavior of micro-controllers, compromising their securit...
Fault injection attacks alter the intended behavior of micro- controllers, compromising their securi...
International audiencePhysical attacks especially fault attacks represent one the major threats agai...
A Fault Attack (FA) is performed mainly under the data corruption model and poses a threat to securi...
International audienceMicrocontrollers storing valuable data or using security functions are vulnera...
Most of the attacks against the Advanced Encryption Standard based on faults mainly aim at either al...
In this paper we present software countermeasures specifically designed to counteract fault injectio...
Current taint checking architectures monitor tainted data usage mainly with control transfer instruc...
We describe a new, general approach for safeguarding systems against any type of code-injection atta...
International audienceFault injection is a well known method to test the robustness and security vul...
Faults attacks are a serious threat to secure devices, because they are powerful and they can be per...
Cryptographic implementations are often vulnerable against physical attacks, fault injection analysi...
A fundamental assumption in software security is that memory contents do not change unless there is ...