Paper 2016/1060
On Analyzing Program Behavior Under Fault Injection Attacks
Jakub Breier
Abstract
Fault attacks pose a serious threat to cryptographic algorithm implementations. It is a non-trivial task to design a code that minimizes the risk of exploiting the incorrect output that was produced by inducing faults in the algorithm execution process. In this paper we propose a design of an instruction set simulator capable of analyzing the code behavior under fault attack conditions. Our simulator is easy to use and provides a valuable insights for the designers that could help to harden the code they implement.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. Accepted to SAW@ARES 2016
- Keywords
- fault attacksfault simulatorinstruction set simulatorcode analysis
- Contact author(s)
- jbreier @ ntu edu sg
- History
- 2016-11-15: received
- Short URL
- https://ia.cr/2016/1060
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/1060, author = {Jakub Breier}, title = {On Analyzing Program Behavior Under Fault Injection Attacks}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/1060}, year = {2016}, url = {https://eprint.iacr.org/2016/1060} }