Paper 2024/1944
SoK: The apprentice guide to automated fault injection simulation for security evaluation
Abstract
Identifying and mitigating vulnerable locations to fault injections requires significant expertise and expensive equipment. Fault injections can damage hardware, cause software crashes, and pose safety and security hazards. Simulating fault injections offers a safer alternative, and fault simulators have steadily developed, though they vary significantly in functionality, target applications, fault injection methods, supported fault models, and guarantees. We present a taxonomy categorizing fault simulators based on their target applications and development cycle stages, from source code to final product. Our taxonomy provides insights and comparisons to highlight open problems.
Metadata
- Available format(s)
- Category
- Applications
- Publication info
- Preprint.
- Keywords
- Fault injectionFault simulatorsFault modelsSensitive regionMutation.
- Contact author(s)
-
asmita adhikary @ ru nl
giacomo petrucci @ ru nl
philippe tanguy @ univ-ubs fr
vianney lapotre @ univ-ubs fr
ileana buhan @ ru nl - History
- 2024-12-02: approved
- 2024-11-30: received
- See all versions
- Short URL
- https://ia.cr/2024/1944
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1944, author = {Asmita Adhikary and Giacomo Tommaso Petrucci and Philippe Tanguy and Vianney Lapôtre and Ileana Buhan}, title = {{SoK}: The apprentice guide to automated fault injection simulation for security evaluation}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1944}, year = {2024}, url = {https://eprint.iacr.org/2024/1944} }