International audienceThis paper introduces a formal workflow for modeling software/hardware systems in order to explore the effects of fault injections and evaluate the robustness to fault injection attacks. We illustrate this workflow on four versions of a PIN authentication code, embedding different software countermeasures. The code is symbolically evaluated on two implementations of the RISC-V CV32E40P core: the original implementation from the OpenHW group and an implementation that integrates protection of the pipeline control signals. On the original, unprotected core, our formal workflow exposes various vulnerabilities, including previously unknown ones, whereas, on the protected core, it confirms the effectiveness of the proposed ...
The dependability of computing systems running cryptographic primitives is a critical factor for eva...
The thesis deals with attacks that cause faults in CPU and MCU calculations. A short voltage change ...
Fault injection has increasingly been used both to attack software applications, and to test system ...
International audienceThis paper introduces a formal workflow for modeling software/hardware systems...
see also https://zenodo.org/record/7958412International audienceThis paper introduces µArchiFI, an o...
International audienceFault injection attacks are considered one of the major threats to cyber-physi...
The adoption of Microprocessors is increasingly diversifying to several embedded and mo- bile device...
Conference: ASHA Convention. Boston, MA. 2018.International audienceFault injection is a powerful te...
International audienceFault injection attacks represent an effective threatto embedded systems. Rece...
International audienceFault injection is a well known method to test the robustness and security vul...
This Artifact support the µArchiFI tool submission to FMCAD23. The abstract is reproduced below: Th...
International audienceSimulation-based fault injection is commonly used to estimate system vulnerabi...
This article reports the results of fault injection on a microcontroller based on the RISC-V (Riscy)...
The dependability of computing systems running cryptographic primitives is a critical factor for eva...
The thesis deals with attacks that cause faults in CPU and MCU calculations. A short voltage change ...
Fault injection has increasingly been used both to attack software applications, and to test system ...
International audienceThis paper introduces a formal workflow for modeling software/hardware systems...
see also https://zenodo.org/record/7958412International audienceThis paper introduces µArchiFI, an o...
International audienceFault injection attacks are considered one of the major threats to cyber-physi...
The adoption of Microprocessors is increasingly diversifying to several embedded and mo- bile device...
Conference: ASHA Convention. Boston, MA. 2018.International audienceFault injection is a powerful te...
International audienceFault injection attacks represent an effective threatto embedded systems. Rece...
International audienceFault injection is a well known method to test the robustness and security vul...
This Artifact support the µArchiFI tool submission to FMCAD23. The abstract is reproduced below: Th...
International audienceSimulation-based fault injection is commonly used to estimate system vulnerabi...
This article reports the results of fault injection on a microcontroller based on the RISC-V (Riscy)...
The dependability of computing systems running cryptographic primitives is a critical factor for eva...
The thesis deals with attacks that cause faults in CPU and MCU calculations. A short voltage change ...
Fault injection has increasingly been used both to attack software applications, and to test system ...