作者: Andrea Holler , Armin Krieg , Tobias Rauter , Johannes Iber , Christian Kreiner
DOI: 10.1109/DSD.2015.79
关键词: General protection fault 、 Computer science 、 Segmentation fault 、 Domain (software engineering) 、 Software 、 Software fault tolerance 、 Use case 、 Fault injection 、 Embedded system 、 Fault (power engineering)
摘要: Physical attacks, such as fault pose a decisive threat for the security of devices in Internet Things. An important class countermeasures attacks is tolerant software that applicable systems based on COTS hardware. In order to evaluate against injection needed. However, established approaches require manufactured products or hardware details (e.g. netlists, RTL models), which are not available when using this paper, we present QEMU-based platform supports commercial processors widely-used embedded domain. This framework allows system-level analysis by featuring simulation high-level faults targeting, example, memory cells, register correct execution instructions. The generation realistic attack scenarios. We illustrate practicability approach presenting two exemplary use cases.