978-1-7281-9930-6/20/International audienceSmartphones have a complex hardware and software architecture. Having access to their full memory space can help solve judicial investigations. We propose a new privilege escalation technique in order to access hidden contents and execute sensitive operations. While classical forensic tools mostly exploit software vulnerabilities, it is based on a hardware security evaluation technique. Electromagnetic fault injection is such a technique usually used for microcontrollers or FPGA security characterization. A security function running at 1.2 GHz on a 64-bit SoC with a Linux-based OS was successfully attacked. The Linux authentication module uses this function to verify the password correctness by com...
An analysis of the effectiveness of fault injection attacks on smart cards using the transient pulse...
Intentional Electromagnetic Interference (IEMI) can be used to support illegal activities ranging fr...
10 pagesInternational audienceInjection of transient faults as a way to attack cryptographic impleme...
Physical attacks by injection of faults by electromagnetic perturbations have the particularity of i...
Fault attacks are traditionally considered under a threat model that assumes the device under test i...
During this thesis, we focused on the security of mobile devices. To do this, we explored physical a...
© 2017 IEEE. Security is acknowledged as one of the main challenges in the design and deployment of ...
Security is acknowledged as one of the main challenges in the design and deployment of embedded circ...
Electromagnetic fault injection (EMFI) is a well known technique used to disturb the behaviour of a ...
The costs and damages that result from cyber security weaknesses are increasing year by year. The cy...
Performing mobile phone acquisition today requires breaking—often hardware assisted—security. In rec...
Hardware and software of secured embedded systems are prone to physical attacks. In particular, faul...
Modern legal and corporate investigations heavily rely on the field of digital forensics to uncover ...
Part 1: Control Systems SecurityInternational audienceTraditional cyber security mechanisms, such as...
Abstract—This paper presents a new type of fault injec-tion method based on intentional electromagne...
An analysis of the effectiveness of fault injection attacks on smart cards using the transient pulse...
Intentional Electromagnetic Interference (IEMI) can be used to support illegal activities ranging fr...
10 pagesInternational audienceInjection of transient faults as a way to attack cryptographic impleme...
Physical attacks by injection of faults by electromagnetic perturbations have the particularity of i...
Fault attacks are traditionally considered under a threat model that assumes the device under test i...
During this thesis, we focused on the security of mobile devices. To do this, we explored physical a...
© 2017 IEEE. Security is acknowledged as one of the main challenges in the design and deployment of ...
Security is acknowledged as one of the main challenges in the design and deployment of embedded circ...
Electromagnetic fault injection (EMFI) is a well known technique used to disturb the behaviour of a ...
The costs and damages that result from cyber security weaknesses are increasing year by year. The cy...
Performing mobile phone acquisition today requires breaking—often hardware assisted—security. In rec...
Hardware and software of secured embedded systems are prone to physical attacks. In particular, faul...
Modern legal and corporate investigations heavily rely on the field of digital forensics to uncover ...
Part 1: Control Systems SecurityInternational audienceTraditional cyber security mechanisms, such as...
Abstract—This paper presents a new type of fault injec-tion method based on intentional electromagne...
An analysis of the effectiveness of fault injection attacks on smart cards using the transient pulse...
Intentional Electromagnetic Interference (IEMI) can be used to support illegal activities ranging fr...
10 pagesInternational audienceInjection of transient faults as a way to attack cryptographic impleme...