Cryptology ePrint Archive: Report 2016/1060

On Analyzing Program Behavior Under Fault Injection Attacks

Jakub Breier

Abstract: Fault attacks pose a serious threat to cryptographic algorithm implementations. It is a non-trivial task to design a code that minimizes the risk of exploiting the incorrect output that was produced by inducing faults in the algorithm execution process. In this paper we propose a design of an instruction set simulator capable of analyzing the code behavior under fault attack conditions. Our simulator is easy to use and provides a valuable insights for the designers that could help to harden the code they implement.

Category / Keywords: implementation / fault attacks, fault simulator, instruction set simulator, code analysis

Original Publication (in the same form): Accepted to SAW@ARES 2016

Date: received 11 Nov 2016

Contact author: jbreier at ntu edu sg

Available format(s): PDF | BibTeX Citation

Version: 20161115:150142 (All versions of this report)

Short URL: ia.cr/2016/1060

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]