International audienceIn the domain of smart cards, secured devices must be protected against high level attack potential [1]. According to norms such as the Common Criteria [2], the vulnerability analysis must cover the current state-of-the-art in term of attacks. Nowadays, a very classical type of attack is fault injection, conducted by means of laser based techniques. We propose a global approach, called Lazart, to evaluate code robustness against fault injections targeting control flow modifications. The originality of Lazart is twofolds. First, we encompass the evaluation process as a whole: starting from a fault model, we produce (or establish the absence of) attacks, taking into consideration software countermeasures. Furthermore, ac...
International audienceFault attacks can target smart card programs in order to disrupt an execution ...
Fault injection has increasingly been used both to attack software applications, and to test system ...
Recently fault injection has increasingly been used both to attack software applications, and to tes...
International audiencePhysical fault injections break security functionalities of algorithms by targ...
Vulnerability detections for smart cards require state of the art methods both to attack and to prot...
Active attackers are able to modify the behavior of the program during its execution. In particular,...
Les attaquants actifs sont capables d'intervenir sur le comportement du programme pendant son exécut...
International audienceFault injection is a well known method to test the robustness and security vul...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
This paper presents a formal verification framework and tool that evaluates the robustness of softwa...
Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent et al. ...
International audienceCertification through auditing allows to ensure that critical embedded systems...
Les systèmes embarqués traitent et manipulent de plus en plus de données sensibles. La sécurité de c...
International audienceFault injection has increasingly been used both to attack software application...
Functional Safety standards like ISO 26262 require a detailed analysis of the dependability of compo...
International audienceFault attacks can target smart card programs in order to disrupt an execution ...
Fault injection has increasingly been used both to attack software applications, and to test system ...
Recently fault injection has increasingly been used both to attack software applications, and to tes...
International audiencePhysical fault injections break security functionalities of algorithms by targ...
Vulnerability detections for smart cards require state of the art methods both to attack and to prot...
Active attackers are able to modify the behavior of the program during its execution. In particular,...
Les attaquants actifs sont capables d'intervenir sur le comportement du programme pendant son exécut...
International audienceFault injection is a well known method to test the robustness and security vul...
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation ...
This paper presents a formal verification framework and tool that evaluates the robustness of softwa...
Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent et al. ...
International audienceCertification through auditing allows to ensure that critical embedded systems...
Les systèmes embarqués traitent et manipulent de plus en plus de données sensibles. La sécurité de c...
International audienceFault injection has increasingly been used both to attack software application...
Functional Safety standards like ISO 26262 require a detailed analysis of the dependability of compo...
International audienceFault attacks can target smart card programs in order to disrupt an execution ...
Fault injection has increasingly been used both to attack software applications, and to test system ...
Recently fault injection has increasingly been used both to attack software applications, and to tes...