Skip to Main content Skip to Navigation
Conference papers

Experimental evaluation of two software countermeasures against fault attacks

Nicolas Moro 1, 2, 3, * Karine Heydemann 3, * Amine Dehbaoui 4 Bruno Robisson 5, * Emmanuelle Encrenaz 3, * 
* Corresponding author
3 ALSOC - Architecture et Logiciels pour Systèmes Embarqués sur Puce
LIP6 - Laboratoire d'Informatique de Paris 6
5 Laboratoire Systèmes et Architectures Sécurisés (LSAS)
SAS-ENSMSE - Département Systèmes et Architectures Sécurisés, CEA-TECH-Reg - CEA Tech en régions
Abstract : Injection of transient faults can be used as a way to attack embedded systems. On embedded processors such as microcontrollers, several studies showed that such a transient fault injection with glitches or electromagnetic pulses could corrupt either the data loads from the memory or the assembly instructions executed by the circuit. Some countermeasure schemes which rely on temporal redundancy have been proposed to handle this issue. Among them, several schemes add this redundancy at assembly instruction level. In this paper, we perform a practical evaluation for two of those countermeasure schemes by using a pulsed electromagnetic fault injection process on a 32-bit microcontroller. We provide some necessary conditions for an efficient implementation of those countermeasure schemes in practice. We also evaluate their efficiency and highlight their limitations. To the best of our knowledge, no experimental evaluation of the security of such instruction-level countermeasure schemes has been published yet.
Complete list of metadata
Contributor : Nicolas Moro Connect in order to contact the contributor
Submitted on : Tuesday, July 22, 2014 - 5:27:08 PM
Last modification on : Tuesday, March 22, 2022 - 3:34:53 AM
Long-term archiving on: : Tuesday, November 25, 2014 - 11:30:39 AM



Nicolas Moro, Karine Heydemann, Amine Dehbaoui, Bruno Robisson, Emmanuelle Encrenaz. Experimental evaluation of two software countermeasures against fault attacks. 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), May 2014, Arlington, United States. pp.112-117, ⟨10.1109/HST.2014.6855580⟩. ⟨emse-01032449⟩



Record views


Files downloads