see also https://zenodo.org/record/7958412International audienceThis paper introduces µArchiFI, an open-source tool dedicated to the formal modeling and verification of microarchitecture-level fault injections and their effects on complex hardware/software systems.First, we address a system-level modeling problem, including an attacker model, which is automatically integrated into the Yosys toolchain.Second, we introduce verification strategies to evaluate the fault effects for software-level security.The practical use of µArchiFI is demonstrated on RISC-V use cases using state-of-the-art model-checking tools for hardware verification
Fault injection has increasingly been used both to attack software applications, and to test system ...
International audience<p>Fault injection attack is an extremely pow-erful technique to extract secre...
Conference: ASHA Convention. Boston, MA. 2018.International audienceFault injection is a powerful te...
This Artifact support the µArchiFI tool submission to FMCAD23. The abstract is reproduced below: Th...
International audienceThis paper introduces a formal workflow for modeling software/hardware systems...
International audienceFault injection attacks are considered one of the major threats to cyber-physi...
The adoption of Microprocessors is increasingly diversifying to several embedded and mo- bile device...
This paper presents a formal verification framework and tool that evaluates the robustness of softwa...
International audienceFault injection is a well known method to test the robustness and security vul...
Fault Injection Analysis is seen as a powerful attack against implementations of cryptographic algor...
The wide usage of hardware Intellectual Property (IP) cores and software programs from untrusted ven...
Physical attacks are serious threats to hardware implementations of any strong cryptographic primiti...
Faults attacks are a serious threat to secure devices, because they are powerful and they can be per...
International audienceFault injection attacks represent an effective threatto embedded systems. Rece...
Fault injection has increasingly been used both to attack software applications and to test system r...
Fault injection has increasingly been used both to attack software applications, and to test system ...
International audience<p>Fault injection attack is an extremely pow-erful technique to extract secre...
Conference: ASHA Convention. Boston, MA. 2018.International audienceFault injection is a powerful te...
This Artifact support the µArchiFI tool submission to FMCAD23. The abstract is reproduced below: Th...
International audienceThis paper introduces a formal workflow for modeling software/hardware systems...
International audienceFault injection attacks are considered one of the major threats to cyber-physi...
The adoption of Microprocessors is increasingly diversifying to several embedded and mo- bile device...
This paper presents a formal verification framework and tool that evaluates the robustness of softwa...
International audienceFault injection is a well known method to test the robustness and security vul...
Fault Injection Analysis is seen as a powerful attack against implementations of cryptographic algor...
The wide usage of hardware Intellectual Property (IP) cores and software programs from untrusted ven...
Physical attacks are serious threats to hardware implementations of any strong cryptographic primiti...
Faults attacks are a serious threat to secure devices, because they are powerful and they can be per...
International audienceFault injection attacks represent an effective threatto embedded systems. Rece...
Fault injection has increasingly been used both to attack software applications and to test system r...
Fault injection has increasingly been used both to attack software applications, and to test system ...
International audience<p>Fault injection attack is an extremely pow-erful technique to extract secre...
Conference: ASHA Convention. Boston, MA. 2018.International audienceFault injection is a powerful te...