High level model of control flow attacks for smart card functional security - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2012

High level model of control flow attacks for smart card functional security

Résumé

Smart card software has to implement software countermeasures to face attacks. Some of these attacks are physical disruptions of chip components that cause a misbehavior in the code execution. A successful functional attack may reveal a secret or grant an undesired authorization. In this paper, we propose to model fault attacks at source level and then simulate these attacks to find out which ones are harmful. After discussing the effects of physical attacks at assembly level and going back to their consequences at source code level, the paper focuses on control flow attacks. Such attacks are good candidates for the proposed model that can be used to exhaustively test the robustness of the attacked program. On the bzip2 software, the paper's results show that up to 21% of the assembly simulated control flow attacks are covered by the C model with 30 times less test cases.
Fichier non déposé

Dates et versions

hal-00721111 , version 1 (26-07-2012)

Identifiants

Citer

Pascal Berthomé, Karine Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande. High level model of control flow attacks for smart card functional security. AReS 2012 - 7th International Conference on Availability, Reliability and Security, Aug 2012, Prague, Czech Republic. pp.224-229, ⟨10.1109/ARES.2012.79⟩. ⟨hal-00721111⟩
270 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More