Skip to Main content Skip to Navigation
Preprints, Working Papers, ...

An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT -- Extended Version

Thomas Given-Wilson 1 Nisrine Jafri 1 Jean-Louis Lanet 1 Axel Legay 1
1 TAMIS - Threat Analysis and Mitigation for Information Security
Inria Rennes – Bretagne Atlantique , IRISA-D4 - LANGAGE ET GÉNIE LOGICIEL
Abstract : Recently fault injection has increasingly been used both to attack software applications, and to test system robustness. Detecting fault injection vulnerabilities has been approached with a variety of different but limited methods. This paper proposes a general process without these limitations that uses model checking to detect fault injection vulnerabilities in binaries. The efficacy of this process is demonstrated by detecting vulnerabilities in the PRESENT binary.
Document type :
Preprints, Working Papers, ...
Complete list of metadata

Cited literature [40 references]  Display  Hide  Download

https://hal.inria.fr/hal-01400283
Contributor : Thomas Given-Wilson <>
Submitted on : Tuesday, April 4, 2017 - 8:26:23 PM
Last modification on : Thursday, January 7, 2021 - 4:40:18 PM

File

main.pdf
Files produced by the author(s)

Identifiers

  • HAL Id : hal-01400283, version 2

Citation

Thomas Given-Wilson, Nisrine Jafri, Jean-Louis Lanet, Axel Legay. An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT -- Extended Version. 2017. ⟨hal-01400283v2⟩

Share

Metrics

Record views

701

Files downloads

1122