Constructing software countermeasures against instruction manipulation attacks: an approach based on vulnerability evaluation using fault simulator

نویسندگان

چکیده

Abstract Fault injection attacks (FIA), which cause information leakage by injecting intentional faults into the data or operations of devices, are one most powerful methods compromising security confidential stored on these devices. Previous studies related to FIA report that attackers can skip instructions running many devices through means fault injection. Most existing anti-FIA countermeasures software designed secure against instruction (IS). On other hand, recent use laser manipulate as they want. Although previous have shown manipulation (IM) could attack IS, no effective IM been proposed. This paper is first work tackling this problem, aiming construct software-based faults. Evaluating program vulnerabilities required consider We propose three simulation environments for aim and compare them reveal their performance difference. GDB (GNU debugger)-based simulator we newly in outperforms QEMU-based presented AICCSA:1–8, 2020 advance, terms evaluation time at $$\times$$ × 400 faster. a target using proposed simulators reveals leading successes classified four classes. coding techniques IMs each classes show effectiveness simulators.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation of Countermeasures Against Fault Attacks on Smart Cards

Java Card are devices subject to either hardware and software attacks. Thus several countermeasures need to be embedded to avoid the effects of these attacks. Recently, the idea to combine logical attacks with a physical attack to bypass bytecode verification has emerged. For instance, correct and legitimate Java Card applications can be dynamically modified on-card using laser beam. Such appli...

متن کامل

SMT-Based Verification of Software Countermeasures against Side-Channel Attacks

A common strategy for designing countermeasures against side channel attacks is using randomization techniques to remove the statistical dependency between sensitive data and side-channel emissions. However, this process is both labor intensive and error prone, and currently, there is a lack of automated tools to formally access how secure a countermeasure really is. We propose the first SMT so...

متن کامل

Low-Cost Software Countermeasures Against Fault Attacks: Implementation and Performances Trade Offs

In this paper we present software countermeasures specifically designed to counteract fault attacks during the execution of a software implementation of a cryptographic algorithm and analyze their efficiency. We propose two approaches that are based on the insertion of redundant computations and checks, which in their general form, are suitable for any cryptographic algorithm. In particular, we...

متن کامل

Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures

Until 2009, Java Cards have been mainly threatened by Logical Attacks based on ill-formed applications. The publication of the Java Card 3.0 Connected Edition specifications and their mandatory on-card byte code verification may have then lead to the end of software-based attacks against such platforms. However, the introduction in the Java Card field of Fault Attacks, well-known from the crypt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cluster Computing

سال: 2021

ISSN: ['1386-7857', '1573-7543']

DOI: https://doi.org/10.1007/s10586-021-03438-6