An automated and scalable formal process for detecting fault injection vulnerabilities in binaries - Archive ouverte HAL Access content directly
Journal Articles Concurrency and Computation: Practice and Experience Year : 2018

An automated and scalable formal process for detecting fault injection vulnerabilities in binaries

(1) , (1) , (1) , (2)
1
2

Abstract

Fault injection has increasingly been used both to attack software applications, and to test system robustness. Detecting fault injection vulnerabilities has been approached with a variety of different but limited methods. This paper proposes an extension of a recently published general model checking based process to detect fault injection vulnerabilities in binaries. This new extension makes the general process scalable to real-world implementions which is demonstrated by detecting vulnerabilities in different cryptographic implementations.
Fichier principal
Vignette du fichier
main.pdf (311.59 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01960940 , version 1 (19-12-2018)
hal-01960940 , version 2 (19-12-2018)

Identifiers

Cite

Thomas Given-Wilson, Annelie Heuser, Nisrine Jafri, Axel Legay. An automated and scalable formal process for detecting fault injection vulnerabilities in binaries. Concurrency and Computation: Practice and Experience, 2018, pp.1-12. ⟨10.1002/cpe.4794⟩. ⟨hal-01960940v2⟩
104 View
219 Download

Altmetric

Share

Gmail Facebook Twitter LinkedIn More