Fault attacks on two software countermeasures

Nicolas Moro 1, 2, * Karine Heydemann 1, * Amine Dehbaoui 3, * Bruno Robisson 2, * Emmanuelle Encrenaz 1, *
* Auteur correspondant
1 ALSOC - Architecture et Logiciels pour Systèmes Embarqués sur Puce
LIP6 - Laboratoire d'Informatique de Paris 6
2 Laboratoire Systèmes et Architectures Sécurisés (LSAS)
SAS-ENSMSE - Département Systèmes et Architectures Sécurisés, CEA Tech Grenoble
Abstract : Injection of transient faults can be used as a way to attack embedded systems. On embedded processors such as microcontrollers, several studies showed that such a transient fault injection could corrupt either the data loads from the memory or the assembly instructions executed by the circuit. Some countermeasure schemes which rely on temporal redundancy have been proposed to handle this issue. Among them, several schemes add this redundancy at assembly instruction level. In this paper, we perform a practical evaluation for two of those countermeasure schemes by using a pulsed electromagnetic fault injection process on a 32-bit microcontroller.
Type de document :
Communication dans un congrès
TRUDEVICE 2014, May 2014, Paderborn, Germany
Liste complète des métadonnées

Contributeur : Nicolas Moro <>
Soumis le : mardi 3 juin 2014 - 10:36:59
Dernière modification le : vendredi 31 août 2018 - 09:25:56
Document(s) archivé(s) le : mercredi 3 septembre 2014 - 11:06:14


  • HAL Id : emse-00998988, version 1



Nicolas Moro, Karine Heydemann, Amine Dehbaoui, Bruno Robisson, Emmanuelle Encrenaz. Fault attacks on two software countermeasures. TRUDEVICE 2014, May 2014, Paderborn, Germany. 〈emse-00998988〉



Consultations de la notice


Téléchargements de fichiers