High Level Model of Control Flow Attacks for Smart Card Functional Security. Berthome, P., Heydemann, K., Kauffmann-Tourkestansky, X., & Lalande, J. In Seventh International Conference on Availability, Reliability and Security, pages 224–229, Prague, Czech Republic, aug, 2012. IEEE Computer Society.
High Level Model of Control Flow Attacks for Smart Card Functional Security [link]Paper  doi  abstract   bibtex   
Smart card software has to implement software countermeasures to face attacks. Some of these attacks are physical disruptions of chip components that cause a misbehavior in the code execution. A successful functional attack may reveal a secret or grant an undesired authorization. In this paper, we propose to model fault attacks at source level and then simulate these attacks to find out which ones are harmful. After discussing the effects of physical attacks at assembly level and going back to their consequences at source code level, the paper focuses on control flow attacks. Such attacks are good candidates for the proposed model that can be used to exhaustively test the robustness of the attacked program. On the bzip2 software, the paper's results show that up to 21% of the assembly simulated control flow attacks are covered by the C model with 30 times less test cases.
@inproceedings{Berthome2012,
abstract = {Smart card software has to implement software countermeasures to face attacks. Some of these attacks are physical disruptions of chip components that cause a misbehavior in the code execution. A successful functional attack may reveal a secret or grant an undesired authorization. In this paper, we propose to model fault attacks at source level and then simulate these attacks to find out which ones are harmful. After discussing the effects of physical attacks at assembly level and going back to their consequences at source code level, the paper focuses on control flow attacks. Such attacks are good candidates for the proposed model that can be used to exhaustively test the robustness of the attacked program. On the bzip2 software, the paper's results show that up to 21{\%} of the assembly simulated control flow attacks are covered by the C model with 30 times less test cases.},
address = {Prague, Czech Republic},
author = {Berthome, Pascal and Heydemann, Karine and Kauffmann-Tourkestansky, X. and Lalande, Jean-Francois},
booktitle = {Seventh International Conference on Availability, Reliability and Security},
doi = {10.1109/ARES.2012.79},
howpublished = {AReS 2012},
isbn = {978-1-4673-2244-7},
keywords = {physical attacks,security,smart card,tests},
month = {aug},
pages = {224--229},
publisher = {IEEE Computer Society},
shorttitle = {Rank B in CORE, Acceptance rate {\textless} 20{\%}.},
title = {{High Level Model of Control Flow Attacks for Smart Card Functional Security}},
url = {http://dx.doi.org/10.1109/ARES.2012.79},
year = {2012}
}

Downloads: 0