Physical attacks by injection of faults by electromagnetic perturbations have the particularity of inducing voltage variations in a circuit to corrupt its operation. Commonly performed on microcontrollers, they are being extended to complex circuits such as multicore processors. Used in mobile systems, these circuits contain a lot of personal data which must be secured.This thesis aims at improving fault injection techniques by electromagnetic perturbations on mobile targets in order to identify their level of vulnerability and to propose adapted protections.A modeling of the magnetic field generated by injection probes was carried out from the Biot and Savart law. It was completed by a dynamic study of the injector-probe couple. Through si...
© 2017 IEEE. Security is acknowledged as one of the main challenges in the design and deployment of ...
Fault injection - for example by focused light, electromagnetic pulse, or power glitch - is an extre...
10 pagesInternational audienceInjection of transient faults as a way to attack cryptographic impleme...
During this thesis, we focused on the security of mobile devices. To do this, we explored physical a...
Les attaques par injection de faute représentent une menace considérable pour les systèmes cyber-phy...
Today, security of embedded devices is put in the limelight with the increasing market share of both...
This thesis is devoted to the study of electromagnetic fault injection attack on se-cure integrated ...
Nowadays, most of the sectors in the industry rely on the use of electronic circuits and systems. Am...
The consumption of integrated circuits has been increasing over the last decade. With the increase o...
This article considers the use of magnetic pulses to inject transient faults into the calculations o...
978-1-7281-9930-6/20/International audienceSmartphones have a complex hardware and software architec...
International audienceElectroMagnetic Fault Injection requires two main devices, a pulse generator a...
Security is acknowledged as one of the main challenges in the design and deployment of embedded circ...
International audienceImplementation attacks are a major threat to hardware cryptographic implementa...
International audienceA fault attack is a well-known technique where the behaviour of a chip is volu...
© 2017 IEEE. Security is acknowledged as one of the main challenges in the design and deployment of ...
Fault injection - for example by focused light, electromagnetic pulse, or power glitch - is an extre...
10 pagesInternational audienceInjection of transient faults as a way to attack cryptographic impleme...
During this thesis, we focused on the security of mobile devices. To do this, we explored physical a...
Les attaques par injection de faute représentent une menace considérable pour les systèmes cyber-phy...
Today, security of embedded devices is put in the limelight with the increasing market share of both...
This thesis is devoted to the study of electromagnetic fault injection attack on se-cure integrated ...
Nowadays, most of the sectors in the industry rely on the use of electronic circuits and systems. Am...
The consumption of integrated circuits has been increasing over the last decade. With the increase o...
This article considers the use of magnetic pulses to inject transient faults into the calculations o...
978-1-7281-9930-6/20/International audienceSmartphones have a complex hardware and software architec...
International audienceElectroMagnetic Fault Injection requires two main devices, a pulse generator a...
Security is acknowledged as one of the main challenges in the design and deployment of embedded circ...
International audienceImplementation attacks are a major threat to hardware cryptographic implementa...
International audienceA fault attack is a well-known technique where the behaviour of a chip is volu...
© 2017 IEEE. Security is acknowledged as one of the main challenges in the design and deployment of ...
Fault injection - for example by focused light, electromagnetic pulse, or power glitch - is an extre...
10 pagesInternational audienceInjection of transient faults as a way to attack cryptographic impleme...