Paper 2016/1060

On Analyzing Program Behavior Under Fault Injection Attacks

Jakub Breier

Abstract

Fault attacks pose a serious threat to cryptographic algorithm implementations. It is a non-trivial task to design a code that minimizes the risk of exploiting the incorrect output that was produced by inducing faults in the algorithm execution process. In this paper we propose a design of an instruction set simulator capable of analyzing the code behavior under fault attack conditions. Our simulator is easy to use and provides a valuable insights for the designers that could help to harden the code they implement.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Accepted to SAW@ARES 2016
Keywords
fault attacksfault simulatorinstruction set simulatorcode analysis
Contact author(s)
jbreier @ ntu edu sg
History
2016-11-15: received
Short URL
https://ia.cr/2016/1060
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/1060,
      author = {Jakub Breier},
      title = {On Analyzing Program Behavior Under Fault Injection Attacks},
      howpublished = {Cryptology ePrint Archive, Paper 2016/1060},
      year = {2016},
      note = {\url{https://eprint.iacr.org/2016/1060}},
      url = {https://eprint.iacr.org/2016/1060}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.