Active attackers are able to modify the behavior of the program during its execution. In particular, fault injection attacks, which originally emerged as a method of testing against accidental hardware faults, are a powerful attack vector in which the attacker can inject faults during execution using physical techniques such as laser beams, or voltage or frequency glitches. More recently, software fault injection methods have been proposed.This thesis focuses on analyzing programs in the context of fault injection attacks, and more particularly multiple faults, which implies that the attacker is able to combine several faults to complete an attack.Combined attacks make more difficult the evaluation of the robustness of programs by tools bec...
The security of embedded systems containing sensitive data has become a main concern. These widely d...
Fault injection has increasingly been used both to attack software applications, and to test system ...
L'objectif de cette thèse est le développement de méthodes de compréhension des logiciels malveillan...
Les attaquants actifs sont capables d'intervenir sur le comportement du programme pendant son exécut...
International audiencePhysical fault injections break security functionalities of algorithms by targ...
Vulnerability detections for smart cards require state of the art methods both to attack and to prot...
International audienceAlthough multi-fault attacks are powerful in defeatingsophisticated hardware a...
Short version of the article "Experimental evaluation of two software countermeasures against fault ...
International audienceIn the domain of smart cards, secured devices must be protected against high l...
Fault injection is a well known method to test the robustness and security vulnerabilities of system...
L’évaluation de la sécurité des appareils IoT contre les menaces logicielles et matérielles potentie...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
International audienceFault injection is a well known method to test the robustness and security vul...
International audienceInjection of transient faults can be used as a way to attack embedded systems....
Fault injection is widely used as a method to evaluate the robustness and security of a system again...
The security of embedded systems containing sensitive data has become a main concern. These widely d...
Fault injection has increasingly been used both to attack software applications, and to test system ...
L'objectif de cette thèse est le développement de méthodes de compréhension des logiciels malveillan...
Les attaquants actifs sont capables d'intervenir sur le comportement du programme pendant son exécut...
International audiencePhysical fault injections break security functionalities of algorithms by targ...
Vulnerability detections for smart cards require state of the art methods both to attack and to prot...
International audienceAlthough multi-fault attacks are powerful in defeatingsophisticated hardware a...
Short version of the article "Experimental evaluation of two software countermeasures against fault ...
International audienceIn the domain of smart cards, secured devices must be protected against high l...
Fault injection is a well known method to test the robustness and security vulnerabilities of system...
L’évaluation de la sécurité des appareils IoT contre les menaces logicielles et matérielles potentie...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
International audienceFault injection is a well known method to test the robustness and security vul...
International audienceInjection of transient faults can be used as a way to attack embedded systems....
Fault injection is widely used as a method to evaluate the robustness and security of a system again...
The security of embedded systems containing sensitive data has become a main concern. These widely d...
Fault injection has increasingly been used both to attack software applications, and to test system ...
L'objectif de cette thèse est le développement de méthodes de compréhension des logiciels malveillan...