An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT -- Extended Version - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Pré-Publication, Document De Travail Année : 2017

An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT -- Extended Version

Résumé

Recently fault injection has increasingly been used both to attack software applications, and to test system robustness. Detecting fault injection vulnerabilities has been approached with a variety of different but limited methods. This paper proposes a general process without these limitations that uses model checking to detect fault injection vulnerabilities in binaries. The efficacy of this process is demonstrated by detecting vulnerabilities in the PRESENT binary.
Fichier principal
Vignette du fichier
main.pdf (189.55 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01400283 , version 1 (30-01-2017)
hal-01400283 , version 2 (04-04-2017)

Identifiants

  • HAL Id : hal-01400283 , version 2

Citer

Thomas Given-Wilson, Nisrine Jafri, Jean-Louis Lanet, Axel Legay. An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT -- Extended Version. 2017. ⟨hal-01400283v2⟩
620 Consultations
1095 Téléchargements

Partager

Gmail Facebook X LinkedIn More