Fault-Channel Watermarks

Abstract : We introduce a new approach for securing intellectual property in embedded software implementations by using the response of an implementation to fault injections. In our approach, the implementation serves as its own watermark that is recorded through its fault effects. There is no additional code for the watermark. A simulator that maps the fault injections to the executed instructions aids an automated characterization of program code. We provide a proof-of-concept implementation of our watermarking approach using an 8-bit ATMega163 microcontroller and several assembly implementations of AES encryption. The results show that our method is well-suited for detection of identical software copies. In addition, our method shows robust performance in detection of software copies with a large number of added dummy instructions.
Type de document :
Communication dans un congrès
Sara Foresti; Javier Lopez. 10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. Springer International Publishing, Lecture Notes in Computer Science, LNCS-9895, pp.204-219, 2016, Information Security Theory and Practice. 〈10.1007/978-3-319-45931-8_13〉
Liste complète des métadonnées

Littérature citée [23 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01639613
Contributeur : Hal Ifip <>
Soumis le : lundi 20 novembre 2017 - 14:54:08
Dernière modification le : lundi 20 novembre 2017 - 14:56:06
Document(s) archivé(s) le : mercredi 21 février 2018 - 16:08:13

Fichier

 Accès restreint
Fichier visible le : 2019-01-01

Connectez-vous pour demander l'accès au fichier

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Peter Samarin, Alexander Skripnik, Kerstin Lemke-Rust. Fault-Channel Watermarks. Sara Foresti; Javier Lopez. 10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. Springer International Publishing, Lecture Notes in Computer Science, LNCS-9895, pp.204-219, 2016, Information Security Theory and Practice. 〈10.1007/978-3-319-45931-8_13〉. 〈hal-01639613〉

Partager

Métriques

Consultations de la notice

276