You are looking at a specific version 20161115:150142 of this paper. See the latest version.

Paper 2016/1060

On Analyzing Program Behavior Under Fault Injection Attacks

Jakub Breier

Abstract

Fault attacks pose a serious threat to cryptographic algorithm implementations. It is a non-trivial task to design a code that minimizes the risk of exploiting the incorrect output that was produced by inducing faults in the algorithm execution process. In this paper we propose a design of an instruction set simulator capable of analyzing the code behavior under fault attack conditions. Our simulator is easy to use and provides a valuable insights for the designers that could help to harden the code they implement.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Accepted to SAW@ARES 2016
Keywords
fault attacksfault simulatorinstruction set simulatorcode analysis
Contact author(s)
jbreier @ ntu edu sg
History
2016-11-15: received
Short URL
https://ia.cr/2016/1060
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.