Software countermeasures for control flow integrity of smart card C codes - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2014

Software countermeasures for control flow integrity of smart card C codes

Résumé

Fault attacks can target smart card programs in order to disrupt an execution and gain an advantage over the data or the embedded functionalities. Among all possible attacks, control flow attacks aim at disrupting the normal execution flow. Identifying harmful control flow attacks as well as designing countermeasures at software level are tedious and tricky for developers. In this paper, we propose a methodology to detect harmful intra-procedural jump attacks at source code level and to automatically inject formally-proven countermeasures. The proposed software countermeasures defeat 100% of attacks that jump over at least two C source code statements or beyond. Experiments show that the resulting code is also hardened against unexpected function calls and jump attacks at assembly level.
Fichier principal
Vignette du fichier
llncs.pdf (293.03 Ko) Télécharger le fichier
demo-CFI.mp4 (21.02 Mo) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Format : Vidéo
Loading...

Dates et versions

hal-01059201 , version 1 (13-09-2014)

Identifiants

Citer

Jean-François Lalande, Karine Heydemann, Pascal Berthomé. Software countermeasures for control flow integrity of smart card C codes. ESORICS - 19th European Symposium on Research in Computer Security, Sep 2014, Wroclaw, Poland. pp.200-218, ⟨10.1007/978-3-319-11212-1_12⟩. ⟨hal-01059201⟩
722 Consultations
1134 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More