Paper 2024/1944

SoK: The apprentice guide to automated fault injection simulation for security evaluation

Asmita Adhikary, Radboud University Nijmegen
Giacomo Tommaso Petrucci, Radboud University Nijmegen
Philippe Tanguy, Université Bretagne Sud
Vianney Lapôtre, Université Bretagne Sud
Ileana Buhan, Radboud University Nijmegen
Abstract

Identifying and mitigating vulnerable locations to fault injections requires significant expertise and expensive equipment. Fault injections can damage hardware, cause software crashes, and pose safety and security hazards. Simulating fault injections offers a safer alternative, and fault simulators have steadily developed, though they vary significantly in functionality, target applications, fault injection methods, supported fault models, and guarantees. We present a taxonomy categorizing fault simulators based on their target applications and development cycle stages, from source code to final product. Our taxonomy provides insights and comparisons to highlight open problems.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Preprint.
Keywords
Fault injectionFault simulatorsFault modelsSensitive regionMutation.
Contact author(s)
asmita adhikary @ ru nl
giacomo petrucci @ ru nl
philippe tanguy @ univ-ubs fr
vianney lapotre @ univ-ubs fr
ileana buhan @ ru nl
History
2024-12-02: approved
2024-11-30: received
See all versions
Short URL
https://ia.cr/2024/1944
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1944,
      author = {Asmita Adhikary and Giacomo Tommaso Petrucci and Philippe Tanguy and Vianney Lapôtre and Ileana Buhan},
      title = {{SoK}: The apprentice guide to automated fault injection simulation for security evaluation},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1944},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1944}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.