Cryptology ePrint Archive: Report 2016/1060
On Analyzing Program Behavior Under Fault Injection Attacks
Abstract: Fault attacks pose a serious threat to cryptographic algorithm implementations. It is a non-trivial task to design a code that minimizes the risk of exploiting the incorrect output that was produced by inducing faults in the algorithm execution process.
In this paper we propose a design of an instruction set simulator capable of analyzing the code behavior under fault attack conditions. Our simulator is easy to use and provides a valuable insights for the designers that could help to harden the code they implement.
Category / Keywords: implementation / fault attacks, fault simulator, instruction set simulator, code analysis
Original Publication (in the same form): Accepted to SAW@ARES 2016
Date: received 11 Nov 2016
Contact author: jbreier at ntu edu sg
Available format(s): PDF | BibTeX Citation
Version: 20161115:150142 (All versions of this report)
Short URL: ia.cr/2016/1060
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]