Instruction duplication
Autor: | Lucian Cojocar, Kostas Papagiannopoulos, Niek Timmers |
---|---|
Přispěvatelé: | Computer Systems, Systems and Network Security, Network Institute |
Jazyk: | angličtina |
Rok vydání: | 2018 |
Předmět: |
Computer science
business.industry Fault tolerance 02 engineering and technology Fault injection Hardware_PERFORMANCEANDRELIABILITY Software countermeasures 020202 computer hardware & architecture Software Duplicate code Gene duplication 0202 electrical engineering electronic engineering information engineering 020201 artificial intelligence & image processing business Computer network |
Zdroj: | Smart Card Research and Advanced Applications-16th International Conference, CARDIS 2017,Revised Selected Papers, 160-179 STARTPAGE=160;ENDPAGE=179;TITLE=Smart Card Research and Advanced Applications-16th International Conference, CARDIS 2017,Revised Selected Papers Cojocar, L, Papagiannopoulos, K & Timmers, N 2018, Instruction duplication : Leaky and not too fault-tolerant! in Smart Card Research and Advanced Applications-16th International Conference, CARDIS 2017,Revised Selected Papers . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10728 LNCS, Springer/Verlag, pp. 160-179, 16th International Conference on Smart Card Research and Advanced Applications, CARDIS 2017, Lugano, Switzerland, 13/11/17 . https://doi.org/10.1007/978-3-319-75208-2_10 Smart Card Research and Advanced Applications ISBN: 9783319752075 CARDIS |
ISSN: | 0302-9743 |
Popis: | Fault injection attacks alter the intended behavior of micro-controllers, compromising their security. These attacks can be mitigated using software countermeasures. A widely-used software-based solution to deflect fault attacks is instruction duplication and n -plication. We explore two main limitations with these approaches: first, we examine the effect of instruction duplication under fault attacks, demonstrating that as fault tolerance mechanism, code duplication does not provide a strong protection in practice. Second, we show that instruction duplication increases side-channel leakage of sensitive code regions using a multivariate exploitation technique both in theory and in practice. |
Databáze: | OpenAIRE |
Externí odkaz: |