International audienceFault injection attacks have become a serious threat against embedded systems. Recently, Laurent et al. have reported that some faults inside the microarchitecture escape all typical software fault models and so software counter-measures. Moreover, state-of-the-art counter-measures, hardware-only or with hardware support, do not consider the integrity of microarchitectural control signals that are the target of these faults. We present SCI-FI, a counter-measure for Control Signal, Code, and Control-Flow Integrity against Fault Injection attacks. SCI-FI combines the protection of pipeline control signals with a fine-grained code and control-flow integrity mechanism, and can additionally provide code authentication. We e...
International audienceIn this paper we present a hardware based solution to verify simultaneously Co...
Fault tolerant software against fault attacks constitutes an important class of countermeasures for ...
International audienceA fault attack is a well-known technique where the behaviour of a chip is volu...
International audienceFault injection attacks have become a serious threat against embedded systems....
Embedded systems are ubiquitous in our everyday life. Those embedded systems, by their nomadic natur...
Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent et al. ...
International audienceFault injection attacks represent an effective threatto embedded systems. Rece...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, ...
<p>Embedded software today is pervasive: they can be found everywhere, from coffee makers and medica...
The security of low-end embedded systems became a very important topic as they are more connected an...
International audienceThis paper introduces a formal workflow for modeling software/hardware systems...
International audienceFault attacks consist in changing the program behavior by injecting faults at ...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
International audienceIn this paper we present a hardware based solution to verify simultaneously Co...
Fault tolerant software against fault attacks constitutes an important class of countermeasures for ...
International audienceA fault attack is a well-known technique where the behaviour of a chip is volu...
International audienceFault injection attacks have become a serious threat against embedded systems....
Embedded systems are ubiquitous in our everyday life. Those embedded systems, by their nomadic natur...
Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent et al. ...
International audienceFault injection attacks represent an effective threatto embedded systems. Rece...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, ...
<p>Embedded software today is pervasive: they can be found everywhere, from coffee makers and medica...
The security of low-end embedded systems became a very important topic as they are more connected an...
International audienceThis paper introduces a formal workflow for modeling software/hardware systems...
International audienceFault attacks consist in changing the program behavior by injecting faults at ...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
International audienceIn this paper we present a hardware based solution to verify simultaneously Co...
Fault tolerant software against fault attacks constitutes an important class of countermeasures for ...
International audienceA fault attack is a well-known technique where the behaviour of a chip is volu...