An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Pré-Publication, Document De Travail Année : 2017

An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries

Résumé

Recently fault injection has increasingly been used both to attack software applications, and to test system robustness. Detecting fault injection vulnerabilities has been approached with a variety of methods, yielding varied results. This paper proposes a general process using model checking to detect fault injection vulnerabilities in binaries. The process is implemented and used to detect a variety of different kinds of fault injection vulnerabilities in binaries.
Fichier principal
Vignette du fichier
main.pdf (270.14 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01400283 , version 1 (30-01-2017)
hal-01400283 , version 2 (04-04-2017)

Identifiants

  • HAL Id : hal-01400283 , version 1

Citer

Thomas Given-Wilson, Nisrine Jafri, Jean-Louis Lanet, Axel Legay. An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries. 2017. ⟨hal-01400283v1⟩
620 Consultations
1096 Téléchargements

Partager

Gmail Facebook X LinkedIn More