Checking the Paths to Identify Mutant Application on Embedded Systems
نویسندگان
چکیده
The resistance of Java Card against attack is based on software and hardware countermeasures, and the ability of the Java platform to check the correct behaviour of Java code (by using bytecode verification for instance). Recently, the idea to combine logical attacks with a physical attack in order to bypass bytecode verification has emerged. For instance, correct and legitimate Java Card applications can be dynamically modified on-card using laser beam. Such applications become mutant applications, with a different control flow from the original expected behaviour. This internal change could lead to bypass control and protection and thus offer illegal access to secret data and operation inside the chip. This paper presents an evaluation of the ability of an application to become mutant and a new countermeasure based on the runtime check of the application control flow to detect the deviant mutations. . . .
منابع مشابه
Reachability checking in complex and concurrent software systems using intelligent search methods
Software system verification is an efficient technique for ensuring the correctness of a software product, especially in safety-critical systems in which a small bug may have disastrous consequences. The goal of software verification is to ensure that the product fulfills the requirements. Studies show that the cost of finding and fixing errors in design time is less than finding and fixing the...
متن کاملFunctional verification on PIL mode with IAR Embedded Workbench
Nowadays, the most common tools and solutions available on the market for verifying ESW are based on structural code analysis and concentrate on checking that all structural items, e.g., executable statements, branches, and paths, within the ESW application have been exercised. A much more important and expensive task consists of checking if the software respects what is specified by its requir...
متن کاملFunctional verification on PIL mode with IAR Embedded Workbench
Nowadays, the most common tools and solutions available on the market for verifying ESW are based on structural code analysis and concentrate on checking that all structural items, e.g., executable statements, branches, and paths, within the ESW application have been exercised. A much more important and expensive task consists of checking if the software respects what is specified by its requir...
متن کاملIntroduction to Schramm-Loewner evolution and its application to critical systems
In this short review we look at recent advances in Schramm-Loewner Evolution (SLE) theory and its application to critical phenomena. The application of SLE goes beyond critical systems to other time dependent, scale invariant phenomena such as turbulence, sand-piles and watersheds. Through the use of SLE, the evolution of conformally invariant paths on the complex plane can be followed; hence a...
متن کاملApplication Development for Safety Critical Distributed Embedded Systems with Model Verification
The increasing use of distributed applications in real-time and safety critical embedded systems results in the need for functional and non-functional system verification in the design process. This paper proposes model verification as solution to identify concept ional design failures in advance, and to verify model correctness in an abstract level. With an extension to classical model checkin...
متن کامل