Software-Only Control-Flow Integrity Against Fault Injection Attacks - Mines Saint-Étienne Accéder directement au contenu
Communication Dans Un Congrès Année : 2023

Software-Only Control-Flow Integrity Against Fault Injection Attacks

Vincent Dupaquis
  • Fonction : Auteur
  • PersonId : 1367391
Olivier Potin
  • Fonction : Auteur
  • PersonId : 872479
Jean-Max Dutertre

Résumé

In this paper, we introduce a new Control-Flow Integrity (CFI) scheme for detecting Fault Injection Attacks (FIA). Our scheme is designed to be as generic as possible and to cover any microcontroller on the market, including non- secure ones. It is a full software approach, designed to detect CFI disruptions caused by FIA. The proposal is portable and designed for a high-level language implementation (C in our case). The main characteristic of our scheme is to link a predictable computed Chain of Trust (CoT) with the assets of a program. This approach classically allows the detection of fault injections leading to an illegitimate path of execution. In addition, this solution is designed to detect when a legitimate execution path is wrongly followed due to FIA. Simulations on several benchmarks finally validate the effectiveness of the method, using a multiple instruction skip faults model.
Fichier principal
Vignette du fichier
hal_BON23_Software-only Control-Flow Integrity against Fault Injection Attacks_DSD_2023.pdf (334.89 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

emse-04519722 , version 1 (25-03-2024)

Identifiants

Citer

François Bonnal, Vincent Dupaquis, Olivier Potin, Jean-Max Dutertre. Software-Only Control-Flow Integrity Against Fault Injection Attacks. 2023 26th Euromicro Conference on Digital System Design (DSD), Sep 2023, Durres, Albania. pp.269-277, ⟨10.1109/DSD60849.2023.00046⟩. ⟨emse-04519722⟩
3 Consultations
1 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More