Fault-resistant partitioning of secure cpus for system co-verification against faults

S Tollec, V Hadži, P Nasahl, M Asavoae… - IACR Transactions on …, 2024 - incs.ub.rub.de
Fault injection attacks are a serious threat to system security, enabling attackers to bypass
protection mechanisms or access sensitive information. To evaluate the robustness of CPU …

ARCHIE: A QEMU-Based framework for architecture-independent evaluation of faults

F Hauschild, K Garb, L Auer, B Selmke… - 2021 Workshop on …, 2021 - ieeexplore.ieee.org
Fault injection is a major threat to embedded system security since it can lead to modified
control flows and leakage of critical security parameters, such as secret keys. However …

MAYO key recovery by fixing vinegar seeds

S Jendral, E Dubrova - Cryptology ePrint Archive, 2024 - eprint.iacr.org
As the industry prepares for the transition to post-quantum secure public key cryptographic
algorithms, vulnerability analysis of their implementations is gaining importance. A …

Inference of robust reachability constraints

Y Sellami, G Girol, F Recoules, D Couroussé… - Proceedings of the …, 2024 - dl.acm.org
Characterization of bugs and attack vectors is in many practical scenarios as important as
their finding. Recently, Girol et. al. have introduced the concept of robust reachability, which …

FaultFinder: lightning-fast, multi-architectural fault injection simulation

K Murdock, M Thompson, D Oswald - … of the 2024 Workshop on Attacks …, 2024 - dl.acm.org
Fault injection is a common technique to break security algorithms on microcontrollers and
other processors. However, it is often unclear which specific effect a physical fault had, for …

SoK: Assisted Fault Simulation: Existing Challenges and Opportunities Offered by AI

A Adhikary, I Buhan - … Conference on Applied Cryptography and Network …, 2023 - Springer
Fault injection attacks have caused implementations to behave unexpectedly, resulting in a
spectacular bypass of security features and even the extraction of cryptographic keys …

[PDF][PDF] µArchiFI: Formal modeling and verification strategies for microarchitetural fault injections

S Tollec, M Asavoae, D Couroussé… - FMCAD. 23-Formal …, 2023 - library.oapen.org
This paper introduces µARCHIFI, an open-source tool dedicated to the formal modeling and
verification of microarchitecture-level fault injections and their effects on complex …

[หนังสือ][B] Cryptography and Embedded Systems Security

X Hou, J Breier - 2024 - Springer
Cryptography is an indispensable tool used to protect information in computing systems.
Billions of people all over the world use it in their daily lives without even noticing there is …

PROLEAD_SW-Probing-Based Software Leakage Detection for ARM Binaries

J Zeitschner, N Müller, A Moradi - Cryptology ePrint Archive, 2023 - eprint.iacr.org
A decisive contribution to the all-embracing protection of cryptographic software, especially
on embedded devices, is the protection against SCA attacks. Masking countermeasures can …

SAMVA: static analysis for multi-fault attack paths determination

A Gicquel, D Hardy, K Heydemann, E Rohou - International Workshop on …, 2023 - Springer
Multi-fault injection attacks are powerful since they allow to bypass software security
mechanisms of embedded devices. Assessing the vulnerability of an application while …