Fault-resistant partitioning of secure cpus for system co-verification against faults

S Tollec, V Hadži, P Nasahl, M Asavoae… - IACR Transactions on …, 2024 - incs.ub.rub.de
Fault injection attacks are a serious threat to system security, enabling attackers to bypass
protection mechanisms or access sensitive information. To evaluate the robustness of CPU …

Microarchitectural Insights into Unexplained Behaviors under Clock Glitch Fault Injection

I Alshaer, B Colombier, C Deleuze, V Beroulle… - … Conference on Smart …, 2023 - Springer
With the widespread use of embedded system devices, hardware designers and software
developers started paying more attention to security issues in order to protect these devices …

From low-level fault modeling (of a pipeline attack) to a proven hardening scheme

S Michelland, C Deleuze, L Gonnord - Proceedings of the 33rd ACM …, 2024 - dl.acm.org
Fault attacks present unique safety and security challenges that require dedicated
countermeasures, even for bug-free programs. Models of these complex attacks are made …

MAFIA: Protecting the microarchitecture of embedded systems against fault injection attacks

T Chamelot, D Couroussé… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent
et al. have reported that fault injection attacks can leverage faults inside the …

Exploring Fault Injection Attacks on CVA6 PMP Configuration Flow

K Quénéhervé, W Pensec, P Tanguy… - 2024 27th Euromicro …, 2024 - ieeexplore.ieee.org
Fault Injection Attacks (FIA) pose significant threats to the security and reliability of
embedded systems. FIAs can be used to target an embedded processor by manipulating its …

Formally Verified Hardening of C Programs against Hardware Fault Injection

B Pesin, S Boulmé, D Monniaux, ML Potet - Proceedings of the 14th …, 2025 - dl.acm.org
A fault attack is a malicious manipulation of the hardware (eg, electromagnetic or laser
pulse) that modifies the behavior of the software. Fault attacks typically target sensitive …

FaultDetective: Explainable to a Fault, from the Design Layout to the Software

Z Liu, D Shanmugam… - IACR Transactions on …, 2024 - philosophymindscience.org
Hardware faults are a known source of security vulnerabilities. Fault injection in secure
embedded systems leads to information leakage and privilege escalation, and countless …

Formal verification of processor microarchitecture to analyze system security against fault attacks

S Tollec - 2024 - theses.hal.science
Fault injection attacks are a serious threat to system security, enabling attackers to bypass
protection mechanisms or access sensitive information. While the security of these systems …

[PDF][PDF] µArchiFI: Formal modeling and verification strategies for microarchitetural fault injections

S Tollec, M Asavoae, D Couroussé… - FMCAD. 23-Formal …, 2023 - library.oapen.org
This paper introduces µARCHIFI, an open-source tool dedicated to the formal modeling and
verification of microarchitecture-level fault injections and their effects on complex …

Cross-Layer Fault Analysis for Microprocessor Architectures (CLAM)

I Alshaer - 2023 - theses.hal.science
With the widespread use of embedded system devices, hardware designers and software
developers started paying more attention to security issues in order to protect these devices …