High Level Model of Control Flow Attacks for Smart Card Functional Security. Berthome, P., Heydemann, K., Kauffmann-Tourkestansky, X., & Lalande, J. In Seventh International Conference on Availability, Reliability and Security, pages 224–229, Prague, Czech Republic, aug, 2012. IEEE Computer Society.
Paper doi abstract bibtex Smart card software has to implement software countermeasures to face attacks. Some of these attacks are physical disruptions of chip components that cause a misbehavior in the code execution. A successful functional attack may reveal a secret or grant an undesired authorization. In this paper, we propose to model fault attacks at source level and then simulate these attacks to find out which ones are harmful. After discussing the effects of physical attacks at assembly level and going back to their consequences at source code level, the paper focuses on control flow attacks. Such attacks are good candidates for the proposed model that can be used to exhaustively test the robustness of the attacked program. On the bzip2 software, the paper's results show that up to 21% of the assembly simulated control flow attacks are covered by the C model with 30 times less test cases.
@inproceedings{Berthome2012,
abstract = {Smart card software has to implement software countermeasures to face attacks. Some of these attacks are physical disruptions of chip components that cause a misbehavior in the code execution. A successful functional attack may reveal a secret or grant an undesired authorization. In this paper, we propose to model fault attacks at source level and then simulate these attacks to find out which ones are harmful. After discussing the effects of physical attacks at assembly level and going back to their consequences at source code level, the paper focuses on control flow attacks. Such attacks are good candidates for the proposed model that can be used to exhaustively test the robustness of the attacked program. On the bzip2 software, the paper's results show that up to 21{\%} of the assembly simulated control flow attacks are covered by the C model with 30 times less test cases.},
address = {Prague, Czech Republic},
author = {Berthome, Pascal and Heydemann, Karine and Kauffmann-Tourkestansky, X. and Lalande, Jean-Francois},
booktitle = {Seventh International Conference on Availability, Reliability and Security},
doi = {10.1109/ARES.2012.79},
howpublished = {AReS 2012},
isbn = {978-1-4673-2244-7},
keywords = {physical attacks,security,smart card,tests},
month = {aug},
pages = {224--229},
publisher = {IEEE Computer Society},
shorttitle = {Rank B in CORE, Acceptance rate {\textless} 20{\%}.},
title = {{High Level Model of Control Flow Attacks for Smart Card Functional Security}},
url = {http://dx.doi.org/10.1109/ARES.2012.79},
year = {2012}
}
Downloads: 0
{"_id":"78Z45MxyS9QDk5ikn","bibbaseid":"berthome-heydemann-kauffmanntourkestansky-lalande-highlevelmodelofcontrolflowattacksforsmartcardfunctionalsecurity-2012","downloads":0,"creationDate":"2016-08-23T23:19:32.872Z","title":"High Level Model of Control Flow Attacks for Smart Card Functional Security","author_short":["Berthome, P.","Heydemann, K.","Kauffmann-Tourkestansky, X.","Lalande, J."],"year":2012,"bibtype":"inproceedings","biburl":"http://www.univ-orleans.fr/lifo/Members/Jean-Francois.Lalande/jf.bib","bibdata":{"bibtype":"inproceedings","type":"inproceedings","abstract":"Smart card software has to implement software countermeasures to face attacks. Some of these attacks are physical disruptions of chip components that cause a misbehavior in the code execution. A successful functional attack may reveal a secret or grant an undesired authorization. In this paper, we propose to model fault attacks at source level and then simulate these attacks to find out which ones are harmful. After discussing the effects of physical attacks at assembly level and going back to their consequences at source code level, the paper focuses on control flow attacks. Such attacks are good candidates for the proposed model that can be used to exhaustively test the robustness of the attacked program. On the bzip2 software, the paper's results show that up to 21% of the assembly simulated control flow attacks are covered by the C model with 30 times less test cases.","address":"Prague, Czech Republic","author":[{"propositions":[],"lastnames":["Berthome"],"firstnames":["Pascal"],"suffixes":[]},{"propositions":[],"lastnames":["Heydemann"],"firstnames":["Karine"],"suffixes":[]},{"propositions":[],"lastnames":["Kauffmann-Tourkestansky"],"firstnames":["X."],"suffixes":[]},{"propositions":[],"lastnames":["Lalande"],"firstnames":["Jean-Francois"],"suffixes":[]}],"booktitle":"Seventh International Conference on Availability, Reliability and Security","doi":"10.1109/ARES.2012.79","howpublished":"AReS 2012","isbn":"978-1-4673-2244-7","keywords":"physical attacks,security,smart card,tests","month":"aug","pages":"224–229","publisher":"IEEE Computer Society","shorttitle":"Rank B in CORE, Acceptance rate \\textless 20%.","title":"High Level Model of Control Flow Attacks for Smart Card Functional Security","url":"http://dx.doi.org/10.1109/ARES.2012.79","year":"2012","bibtex":"@inproceedings{Berthome2012,\nabstract = {Smart card software has to implement software countermeasures to face attacks. Some of these attacks are physical disruptions of chip components that cause a misbehavior in the code execution. A successful functional attack may reveal a secret or grant an undesired authorization. In this paper, we propose to model fault attacks at source level and then simulate these attacks to find out which ones are harmful. After discussing the effects of physical attacks at assembly level and going back to their consequences at source code level, the paper focuses on control flow attacks. Such attacks are good candidates for the proposed model that can be used to exhaustively test the robustness of the attacked program. On the bzip2 software, the paper's results show that up to 21{\\%} of the assembly simulated control flow attacks are covered by the C model with 30 times less test cases.},\naddress = {Prague, Czech Republic},\nauthor = {Berthome, Pascal and Heydemann, Karine and Kauffmann-Tourkestansky, X. and Lalande, Jean-Francois},\nbooktitle = {Seventh International Conference on Availability, Reliability and Security},\ndoi = {10.1109/ARES.2012.79},\nhowpublished = {AReS 2012},\nisbn = {978-1-4673-2244-7},\nkeywords = {physical attacks,security,smart card,tests},\nmonth = {aug},\npages = {224--229},\npublisher = {IEEE Computer Society},\nshorttitle = {Rank B in CORE, Acceptance rate {\\textless} 20{\\%}.},\ntitle = {{High Level Model of Control Flow Attacks for Smart Card Functional Security}},\nurl = {http://dx.doi.org/10.1109/ARES.2012.79},\nyear = {2012}\n}\n","author_short":["Berthome, P.","Heydemann, K.","Kauffmann-Tourkestansky, X.","Lalande, J."],"key":"Berthome2012","id":"Berthome2012","bibbaseid":"berthome-heydemann-kauffmanntourkestansky-lalande-highlevelmodelofcontrolflowattacksforsmartcardfunctionalsecurity-2012","role":"author","urls":{"Paper":"http://dx.doi.org/10.1109/ARES.2012.79"},"keyword":["physical attacks","security","smart card","tests"],"downloads":0,"html":""},"search_terms":["high","level","model","control","flow","attacks","smart","card","functional","security","berthome","heydemann","kauffmann-tourkestansky","lalande"],"keywords":["physical attacks","security","smart card","tests"],"authorIDs":[],"dataSources":["YwymHcwEcgbgGS84Z"]}