Fault attacks on two software countermeasures - Mines Saint-Étienne Access content directly
Conference Papers Year : 2014

Fault attacks on two software countermeasures

Abstract

Injection of transient faults can be used as a way to attack embedded systems. On embedded processors such as microcontrollers, several studies showed that such a transient fault injection could corrupt either the data loads from the memory or the assembly instructions executed by the circuit. Some countermeasure schemes which rely on temporal redundancy have been proposed to handle this issue. Among them, several schemes add this redundancy at assembly instruction level. In this paper, we perform a practical evaluation for two of those countermeasure schemes by using a pulsed electromagnetic fault injection process on a 32-bit microcontroller.
Fichier principal
Vignette du fichier
TRUDEVICE-2014-Article.pdf (153.94 Ko) Télécharger le fichier
TRUDEVICE-2014-Presentation.pdf (945.26 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Format Other

Dates and versions

emse-00998988 , version 1 (03-06-2014)

Identifiers

  • HAL Id : emse-00998988 , version 1

Cite

Nicolas Moro, Karine Heydemann, Amine Dehbaoui, Bruno Robisson, Emmanuelle Encrenaz. Fault attacks on two software countermeasures. TRUDEVICE 2014, May 2014, Paderborn, Germany. ⟨emse-00998988⟩
402 View
584 Download

Share

Gmail Mastodon Facebook X LinkedIn More