Efficient Design and Evaluation of Countermeasures against Fault Attacks Using Formal Verification

作者: Lucien Goubet , Karine Heydemann , Emmanuelle Encrenaz , Ronald De Keulenaer

DOI: 10.1007/978-3-319-31271-2_11

关键词:

摘要: This paper presents a formal verification framework and tool that evaluates the robustness of software countermeasures against fault-injection attacks. By modeling reference assembly code its protected variant as automata, can generate set equations for an SMT solver, solutions which represent possible attack paths. Using we developed, evaluated state-of-the-art fault injection Based on insights gathered from this evaluation, analyze any remaining weaknesses propose applications these are more robust.

参考文章(24)
Jean-François Lalande, Karine Heydemann, Pascal Berthomé, Software Countermeasures for Control Flow Integrity of Smart Card C Codes european symposium on research in computer security. ,vol. 8713, pp. 200- 218 ,(2014) , 10.1007/978-3-319-11212-1_12
Ali Galip Bayrak, Francesco Regazzoni, David Novo, Paolo Ienne, Sleuth: Automated Verification of Software Power Analysis Countermeasures Cryptographic Hardware and Embedded Systems - CHES 2013. pp. 293- 310 ,(2013) , 10.1007/978-3-642-40349-1_17
Hassan Eldib, Chao Wang, Synthesis of Masking Countermeasures against Side Channel Attacks computer aided verification. pp. 114- 130 ,(2014) , 10.1007/978-3-319-08867-9_8
Nicolas Moro, Sécurisation de programmes assembleur face aux attaques visant les processeurs embarqués Université Pierre et Marie Curie - Paris VI. ,(2014)
Dan Boneh, Richard A. DeMillo, Richard J. Lipton, On the importance of checking cryptographic protocols for faults theory and application of cryptographic techniques. pp. 37- 51 ,(1997) , 10.1007/3-540-69053-0_4
Boutheina Chetali, Quang-Huy Nguyen, Industrial Use of Formal Methods for a High-Level Security Evaluation Lecture Notes in Computer Science. pp. 198- 213 ,(2008) , 10.1007/978-3-540-68237-0_15
Ronald De Keulenaer, Jonas Maebe, Koen De Bosschere, Bjorn De Sutter, Link-time smart card code hardening International Journal of Information Security. ,vol. 15, pp. 111- 130 ,(2016) , 10.1007/S10207-015-0282-0
Seyyed Amir Asghari, Atena Abdi, Hassan Taheri, Hossein Pedram, Saadat Pourmozaffari, SEDSR: Soft Error Detection Using Software Redundancy Journal of Software Engineering and Applications. ,vol. 05, pp. 664- 670 ,(2012) , 10.4236/JSEA.2012.59078
Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi, Israel Koren, Passive and Active Combined Attacks on AES Combining Fault Attacks and Side Channel Analysis workshop on fault diagnosis and tolerance in cryptography. pp. 92- 102 ,(2007) , 10.1109/FDTC.2007.10
G.A. Reis, J. Chang, N. Vachharajani, R. Rangan, D.I. August, SWIFT: Software Implemented Fault Tolerance symposium on code generation and optimization. pp. 243- 254 ,(2005) , 10.1109/CGO.2005.34