Compilation of a Countermeasure Against Instruction-Skip Fault Attacks

Abstract : Physical attacks especially fault attacks represent one the major threats against embedded systems. In the state of the art, software countermeasures against fault attacks are either applied at the source code level where it will very likely be removed at compilation time, or at assembly level where several transformations need to be performed on the assembly code and lead to significant overheads both in terms of code size and execution time. This paper presents the use of compiler techniques to efficiently automate the application of software countermeasures against instruction-skip fault attacks. We propose a modified LLVM compiler that considers our security objectives throughout the compilation process. Experimental results illustrate the effectiveness of this approach on AES implementations running on an ARM-based microcontroller in terms of security overhead compared to existing solutions.
Type de document :
Communication dans un congrès
Third Workshop on Cryptography and Security in Computing Systems, Jan 2016, Prague, Czech Republic. 〈http://www.cs2.deib.polimi.it/〉. 〈10.1145/2858930.2858931〉
Liste complète des métadonnées

Littérature citée [10 références]  Voir  Masquer  Télécharger

https://hal-emse.ccsd.cnrs.fr/emse-01271252
Contributeur : Bruno Robisson <>
Soumis le : mardi 9 février 2016 - 09:49:10
Dernière modification le : mercredi 23 mai 2018 - 13:16:02
Document(s) archivé(s) le : samedi 12 novembre 2016 - 14:11:46

Fichiers

Barry_2015_compile_protection_...
Fichiers produits par l'(les) auteur(s)

Identifiants

Citation

Thierno Barry, Damien Couroussé, Bruno Robisson. Compilation of a Countermeasure Against Instruction-Skip Fault Attacks. Third Workshop on Cryptography and Security in Computing Systems, Jan 2016, Prague, Czech Republic. 〈http://www.cs2.deib.polimi.it/〉. 〈10.1145/2858930.2858931〉. 〈emse-01271252〉

Partager

Métriques

Consultations de la notice

229

Téléchargements de fichiers

320