International audienceWith the increasing complexity of digital applications, the use of variable-length instruction sets became essential, in order to achieve higher code density and thus better performance. However, security aspects must always be considered, in particular with the significant improvement of attack techniques and equipment. Fault injection, in particular, is among the most interesting and promising attack techniques thanks to the recent advancements. In this article, we provide proper characterization, at the instruction set architecture (ISA) level, for several faulty behaviors that can be obtained when targeting a variable-length instruction set. We take into account the binary encoding of instructions, and show how the...
The Hack computer's instruction set architecture (ISA) and derived machine language is sparse compar...
We describe a new, general approach for safeguarding systems against any type of code-injection atta...
Hardware and software of secured embedded systems are prone to physical attacks. In particular, faul...
International audienceWith the increasing complexity of digital applications, the use of variable-le...
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, f...
Fault injection attacks alter the intended behavior of micro-controllers, compromising their securit...
ISA-level fault injection, i.e. the injection of bit- flip faults in Instruction Set Architecture (I...
A Fault Attack (FA) is performed mainly under the data corruption model and poses a threat to securi...
Fault injection attacks alter the intended behavior of micro- controllers, compromising their securi...
Technology scaling of integrated circuits is making transistors increasingly sensitive to process va...
ISA-level fault injection, i.e. the injection of bit-flip faults in Instruction Set Architecture (IS...
This paper presents the results of an extensive fault injection study of the impact of processor fau...
This paper presents the results of an extensive experimental study of bit-flip errors in instruction...
International audiencePhysical attacks are a known threat posed against secure embedded systems. Not...
International audienceMany fault injection techniques have been proposed in the recent years to atta...
The Hack computer's instruction set architecture (ISA) and derived machine language is sparse compar...
We describe a new, general approach for safeguarding systems against any type of code-injection atta...
Hardware and software of secured embedded systems are prone to physical attacks. In particular, faul...
International audienceWith the increasing complexity of digital applications, the use of variable-le...
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, f...
Fault injection attacks alter the intended behavior of micro-controllers, compromising their securit...
ISA-level fault injection, i.e. the injection of bit- flip faults in Instruction Set Architecture (I...
A Fault Attack (FA) is performed mainly under the data corruption model and poses a threat to securi...
Fault injection attacks alter the intended behavior of micro- controllers, compromising their securi...
Technology scaling of integrated circuits is making transistors increasingly sensitive to process va...
ISA-level fault injection, i.e. the injection of bit-flip faults in Instruction Set Architecture (IS...
This paper presents the results of an extensive fault injection study of the impact of processor fau...
This paper presents the results of an extensive experimental study of bit-flip errors in instruction...
International audiencePhysical attacks are a known threat posed against secure embedded systems. Not...
International audienceMany fault injection techniques have been proposed in the recent years to atta...
The Hack computer's instruction set architecture (ISA) and derived machine language is sparse compar...
We describe a new, general approach for safeguarding systems against any type of code-injection atta...
Hardware and software of secured embedded systems are prone to physical attacks. In particular, faul...