作者: Thierno Barry , Damien Couroussé , Bruno Robisson
关键词:
摘要: Physical attacks especially fault represent one the major threats against embedded systems. In state of art, software countermeasures are either applied at source code level where it will very likely be removed compilation time, or assembly several transformations need to performed on and lead significant overheads both in terms size execution time. This paper presents use compiler techniques efficiently automate application instruction-skip attacks. We propose a modified LLVM that considers our security objectives throughout process. Experimental results illustrate effectiveness this approach AES implementations running an ARM-based microcontroller overhead compared existing solutions.