International audienceFault injection attacks represent an effective threatto embedded systems. Recently, Laurent et al. have reported thatfault injection attacks can leverage faults inside the microarchi-tecture. However, state-of-the-art counter-measures, hardware-only or with hardware support, do not consider the integrityof microarchitecture control signals that are the target of thesefaults.We present MAFIA, a microarchitecture protection againstfault injection attacks. MAFIA ensures integrity of pipelinecontrol signals through a signature-based mechanism, and en-sures fine-grained control-flow integrity with a complete indirectbranch support and code authenticity. We analyse the securityproperties of two different implementations with...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
Short version of the article "Experimental evaluation of two software countermeasures against fault ...
International audienceFault injection attacks represent an effective threatto embedded systems. Rece...
Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent et al. ...
International audienceFault injection attacks have become a serious threat against embedded systems....
Embedded systems are ubiquitous in our everyday life. Those embedded systems, by their nomadic natur...
Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT) and Opera...
International audienceThis paper introduces a formal workflow for modeling software/hardware systems...
The security of low-end embedded systems became a very important topic as they are more connected an...
Les processeurs embarqués peuvent faire l’objet d’attaques physiques en raison de la proximité entre...
Presented on October 28, 2016 at 12:00 p.m. in the Pettit Microelectronics Research Building, MIRC R...
Fault tolerant software against fault attacks constitutes an important class of countermeasures for ...
Embedded processors can be subject to physical attacks due to some proximity between an attacker and...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
Short version of the article "Experimental evaluation of two software countermeasures against fault ...
International audienceFault injection attacks represent an effective threatto embedded systems. Rece...
Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent et al. ...
International audienceFault injection attacks have become a serious threat against embedded systems....
Embedded systems are ubiquitous in our everyday life. Those embedded systems, by their nomadic natur...
Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT) and Opera...
International audienceThis paper introduces a formal workflow for modeling software/hardware systems...
The security of low-end embedded systems became a very important topic as they are more connected an...
Les processeurs embarqués peuvent faire l’objet d’attaques physiques en raison de la proximité entre...
Presented on October 28, 2016 at 12:00 p.m. in the Pettit Microelectronics Research Building, MIRC R...
Fault tolerant software against fault attacks constitutes an important class of countermeasures for ...
Embedded processors can be subject to physical attacks due to some proximity between an attacker and...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
Short version of the article "Experimental evaluation of two software countermeasures against fault ...