Software-Only Control-Flow Integrity Against Fault Injection Attacks - Mines Saint-Étienne Access content directly
Conference Papers Year : 2023

Software-Only Control-Flow Integrity Against Fault Injection Attacks

Vincent Dupaquis
  • Function : Author
  • PersonId : 1367391
Olivier Potin
  • Function : Author
  • PersonId : 872479
Jean-Max Dutertre

Abstract

In this paper, we introduce a new Control-Flow Integrity (CFI) scheme for detecting Fault Injection Attacks (FIA). Our scheme is designed to be as generic as possible and to cover any microcontroller on the market, including non- secure ones. It is a full software approach, designed to detect CFI disruptions caused by FIA. The proposal is portable and designed for a high-level language implementation (C in our case). The main characteristic of our scheme is to link a predictable computed Chain of Trust (CoT) with the assets of a program. This approach classically allows the detection of fault injections leading to an illegitimate path of execution. In addition, this solution is designed to detect when a legitimate execution path is wrongly followed due to FIA. Simulations on several benchmarks finally validate the effectiveness of the method, using a multiple instruction skip faults model.
Fichier principal
Vignette du fichier
hal_BON23_Software-only Control-Flow Integrity against Fault Injection Attacks_DSD_2023.pdf (334.89 Ko) Télécharger le fichier
Origin Files produced by the author(s)

Dates and versions

emse-04519722 , version 1 (25-03-2024)

Identifiers

Cite

François Bonnal, Vincent Dupaquis, Olivier Potin, Jean-Max Dutertre. Software-Only Control-Flow Integrity Against Fault Injection Attacks. 2023 26th Euromicro Conference on Digital System Design (DSD), Sep 2023, Durres, Albania. pp.269-277, ⟨10.1109/DSD60849.2023.00046⟩. ⟨emse-04519722⟩

Collections

EMSE
14 View
25 Download

Altmetric

Share

Gmail Mastodon Facebook X LinkedIn More