High level model of control flow attacks for smart card functional security. Berthomé, P., Heydemann, K., Kauffmann-Tourkestansky, X., & Lalande, J. In 7th International Conference on Availability, Reliability and Security, pages 224--229, Prague, Czech Republic, aug, 2012. IEEE Computer Society.
Paper doi abstract bibtex Smart card software has to implement software countermeasures to face attacks. Some of these attacks are physical disruptions of chip components that cause a misbehavior in the code execution. A successful functional attack may reveal a secret or grant an undesired authorization. In this paper, we propose to model fault attacks at source level and then simulate these attacks to find out which ones are harmful. After discussing the effects of physical attacks at assembly level and going back to their consequences at source code level, the paper focuses on control flow attacks. Such attacks are good candidates for the proposed model that can be used to exhaustively test the robustness of the attacked program. On the bzip2 software, the paper's results show that up to 21% of the assembly simulated control flow attacks are covered by the C model with 30 times less test cases.
@inproceedings{Berthome2012,
abstract = {Smart card software has to implement software countermeasures to face attacks. Some of these attacks are physical disruptions of chip components that cause a misbehavior in the code execution. A successful functional attack may reveal a secret or grant an undesired authorization. In this paper, we propose to model fault attacks at source level and then simulate these attacks to find out which ones are harmful. After discussing the effects of physical attacks at assembly level and going back to their consequences at source code level, the paper focuses on control flow attacks. Such attacks are good candidates for the proposed model that can be used to exhaustively test the robustness of the attacked program. On the bzip2 software, the paper's results show that up to 21{\%} of the assembly simulated control flow attacks are covered by the C model with 30 times less test cases.},
address = {Prague, Czech Republic},
author = {Berthom{\'{e}}, Pascal and Heydemann, Karine and Kauffmann-Tourkestansky, Xavier and Lalande, Jean-Fran{\c{c}}ois},
booktitle = {7th International Conference on Availability, Reliability and Security},
doi = {10.1109/ARES.2012.79},
howpublished = {AReS 2012},
keywords = {physical attacks,security,smart card,tests},
month = {aug},
pages = {224--229},
publisher = {IEEE Computer Society},
shorttitle = {Rang B dans CORE, taux d’acceptation < 20{\%}.},
title = {{High level model of control flow attacks for smart card functional security}},
url = {http://dx.doi.org/10.1109/ARES.2012.79},
year = {2012}
}
Downloads: 0
{"_id":{"_str":"51f5986128e84a503b000331"},"__v":5,"authorIDs":["5457eff52abc8e9f370008d8"],"author_short":["Berthomé, P.","Heydemann, K.","Kauffmann-Tourkestansky, X.","Lalande, J."],"bibbaseid":"berthom-heydemann-kauffmanntourkestansky-lalande-highlevelmodelofcontrolflowattacksforsmartcardfunctionalsecurity-2012","bibdata":{"bibtype":"inproceedings","type":"inproceedings","abstract":"Smart card software has to implement software countermeasures to face attacks. Some of these attacks are physical disruptions of chip components that cause a misbehavior in the code execution. A successful functional attack may reveal a secret or grant an undesired authorization. In this paper, we propose to model fault attacks at source level and then simulate these attacks to find out which ones are harmful. After discussing the effects of physical attacks at assembly level and going back to their consequences at source code level, the paper focuses on control flow attacks. Such attacks are good candidates for the proposed model that can be used to exhaustively test the robustness of the attacked program. On the bzip2 software, the paper's results show that up to 21% of the assembly simulated control flow attacks are covered by the C model with 30 times less test cases.","address":"Prague, Czech Republic","author":[{"propositions":[],"lastnames":["Berthomé"],"firstnames":["Pascal"],"suffixes":[]},{"propositions":[],"lastnames":["Heydemann"],"firstnames":["Karine"],"suffixes":[]},{"propositions":[],"lastnames":["Kauffmann-Tourkestansky"],"firstnames":["Xavier"],"suffixes":[]},{"propositions":[],"lastnames":["Lalande"],"firstnames":["Jean-François"],"suffixes":[]}],"booktitle":"7th International Conference on Availability, Reliability and Security","doi":"10.1109/ARES.2012.79","howpublished":"AReS 2012","keywords":"physical attacks,security,smart card,tests","month":"aug","pages":"224--229","publisher":"IEEE Computer Society","shorttitle":"Rang B dans CORE, taux d’acceptation < 20%.","title":"High level model of control flow attacks for smart card functional security","url":"http://dx.doi.org/10.1109/ARES.2012.79","year":"2012","bibtex":"@inproceedings{Berthome2012,\nabstract = {Smart card software has to implement software countermeasures to face attacks. Some of these attacks are physical disruptions of chip components that cause a misbehavior in the code execution. A successful functional attack may reveal a secret or grant an undesired authorization. In this paper, we propose to model fault attacks at source level and then simulate these attacks to find out which ones are harmful. After discussing the effects of physical attacks at assembly level and going back to their consequences at source code level, the paper focuses on control flow attacks. Such attacks are good candidates for the proposed model that can be used to exhaustively test the robustness of the attacked program. On the bzip2 software, the paper's results show that up to 21{\\%} of the assembly simulated control flow attacks are covered by the C model with 30 times less test cases.},\naddress = {Prague, Czech Republic},\nauthor = {Berthom{\\'{e}}, Pascal and Heydemann, Karine and Kauffmann-Tourkestansky, Xavier and Lalande, Jean-Fran{\\c{c}}ois},\nbooktitle = {7th International Conference on Availability, Reliability and Security},\ndoi = {10.1109/ARES.2012.79},\nhowpublished = {AReS 2012},\nkeywords = {physical attacks,security,smart card,tests},\nmonth = {aug},\npages = {224--229},\npublisher = {IEEE Computer Society},\nshorttitle = {Rang B dans CORE, taux d’acceptation < 20{\\%}.},\ntitle = {{High level model of control flow attacks for smart card functional security}},\nurl = {http://dx.doi.org/10.1109/ARES.2012.79},\nyear = {2012}\n}\n","author_short":["Berthomé, P.","Heydemann, K.","Kauffmann-Tourkestansky, X.","Lalande, J."],"key":"Berthome2012","id":"Berthome2012","bibbaseid":"berthom-heydemann-kauffmanntourkestansky-lalande-highlevelmodelofcontrolflowattacksforsmartcardfunctionalsecurity-2012","role":"author","urls":{"Paper":"http://dx.doi.org/10.1109/ARES.2012.79"},"keyword":["physical attacks","security","smart card","tests"],"downloads":0,"html":""},"bibtype":"inproceedings","biburl":"http://www.univ-orleans.fr/lifo/Members/Jean-Francois.Lalande/jf.bib","downloads":0,"keywords":["physical attacks","security","smart card","tests"],"search_terms":["high","level","model","control","flow","attacks","smart","card","functional","security","berthomé","heydemann","kauffmann-tourkestansky","lalande"],"title":"High level model of control flow attacks for smart card functional security","title_words":["high","level","model","control","flow","attacks","smart","card","functional","security"],"year":2012,"dataSources":["YwymHcwEcgbgGS84Z"]}