Software countermeasures against the multiple instructions skip fault model

V Khuat, JM Dutertre, JL Danger - Microelectronics Reliability, 2024 - Elsevier
In this work, we proposed two software countermeasures (CMs) for the detection of multiple
instructions skips caused by Fault Injection (FI). The first CM is based on code duplication …

Experimental analysis of the electromagnetic instruction skip fault model and consequences for software countermeasures

JM Dutertre, A Menu, O Potin, JB Rigaud… - Microelectronics …, 2021 - Elsevier
Microcontrollers storing valuable data or using security functions are vulnerable to fault
injection attacks. Among the various types of faults, instruction skips induced at runtime …

Experimental analysis of the laser-induced instruction skip fault model

JM Dutertre, T Riom, O Potin, JB Rigaud - Secure IT Systems: 24th Nordic …, 2019 - Springer
Microcontrollers storing valuable data or using security functions are vulnerable to fault
injection attacks. Among the various types of faults, instruction skips induced at runtime …

Opcode vector: An efficient scheme to detect soft errors in instructions

J Martinez, M Atamaner, P Reviriego, O Ergin… - Microelectronics …, 2018 - Elsevier
Bit flips on instructions may affect the execution of the processor depending on the
Instruction Set Architecture (ISA) and the location of the flipped bits. Intrinsically, ISAs may …

Experimental analysis of the electromagnetic instruction skip fault model

A Menu, JM Dutertre, O Potin… - 2020 15th Design & …, 2020 - ieeexplore.ieee.org
Microcontrollers storing valuable data or using security functions are vulnerable to fault
injection attacks. Among the various types of faults, instruction skips induced at runtime …

Laser-induced controllable instruction replacement fault attack

J Sakamoto, D Fujimoto… - IEICE Transactions on …, 2020 - search.ieice.org
To develop countermeasures against fault attacks, it is important to model an attacker's
ability. The instruction skip model is a well-studied practical model for fault attacks on …

Cross-layer analysis of clock glitch fault injection while fetching variable-length instructions

I Alshaer, G Burghoorn, B Colombier… - Journal of Cryptographic …, 2024 - Springer
With the increasing complexity of embedded systems, the use of variable-length instruction
sets has become essential, so that higher code density and better performance can be …

Instruction duplication: Leaky and not too fault-tolerant!

L Cojocar, K Papagiannopoulos, N Timmers - Smart Card Research and …, 2018 - Springer
Fault injection attacks alter the intended behavior of micro-controllers, compromising their
security. These attacks can be mitigated using software countermeasures. A widely-used …

Constructing software countermeasures against instruction manipulation attacks: an approach based on vulnerability evaluation using fault simulator

J Sakamoto, S Hayashi, D Fujimoto, T Matsumoto - Cluster Computing, 2022 - Springer
Fault injection attacks (FIA), which cause information leakage by injecting intentional faults
into the data or operations of devices, are one of the most powerful methods compromising …

Instruction-Fetching Attack and Practice in Collision Fault Attack on AES

H Jiang, X Zhu, J Han - Symmetry, 2022 - mdpi.com
A Fault Attack (FA) is performed mainly under the data corruption model and poses a threat
to security chips. Instruction corruption can enact the same purpose at the behavioral level …