Zobrazeno 1 - 10
of 70
pro vyhledávání: '"Heydemann, Karine"'
Publikováno v:
IEEE TCAD (2023)
Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent et al. have reported that fault injection attacks can leverage faults inside the microarchitecture. However, state-of-the-art counter-measures, hardwareonly
Externí odkaz:
http://arxiv.org/abs/2309.02255
Secure applications implement software protections against side-channel and physical attacks. Such protections are meaningful at machine code or micro-architectural level, but they typically do not carry observable semantics at source level. To preve
Externí odkaz:
http://arxiv.org/abs/2101.06039
In the area of physical attacks, system-on-chip (SoC) designs have not received the same level of attention as simpler micro-controllers. We try to model the behavior of secure software running on a superscalar out-of-order microprocessor typical of
Externí odkaz:
http://arxiv.org/abs/1903.02623
Injection of transient faults can be used as a way to attack embedded systems. On embedded processors such as microcontrollers, several studies showed that such a transient fault injection with glitches or electromagnetic pulses could corrupt either
Externí odkaz:
http://arxiv.org/abs/1407.6019
To efficiently exploit the resources of new many-core architectures, integrating dozens or even hundreds of cores per chip, parallel programming models have evolved to expose massive amounts of parallelism, often in the form of fine-grained tasks. Ta
Externí odkaz:
http://arxiv.org/abs/1405.2916
Publikováno v:
Journal of Cryptographic Engineering (2014) 1-12
Fault attacks against embedded circuits enabled to define many new attack paths against secure circuits. Every attack path relies on a specific fault model which defines the type of faults that the attacker can perform. On embedded processors, a faul
Externí odkaz:
http://arxiv.org/abs/1402.6461
Publikováno v:
10th workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2013, Santa-Barbara : United States (2013)
Injection of transient faults as a way to attack cryptographic implementations has been largely studied in the last decade. Several attacks that use electromagnetic fault injection against hardware or software architectures have already been presente
Externí odkaz:
http://arxiv.org/abs/1402.6421
Publikováno v:
In Computers & Security August 2019 85:202-224
Autor:
Cassé, Hugues, Heydemann, Karine, Ozaktas, Haluk, Ponroy, Jonathan, Rochange, Christine, Zendra, Olivier
Typical constraints on embedded systems include code size limits, upper bounds on energy consumption and hard or soft deadlines. To meet these requirements, it may be necessary to improve the software by applying various kinds of transformations like
Externí odkaz:
http://arxiv.org/abs/1011.6031
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.