Passer à la navigation principale Passer à la recherche Passer au contenu principal

Verifying Redundant-Check Based Countermeasures: A Case Study

Résultats de recherche: Le chapitre dans un livre, un rapport, une anthologie ou une collectionContribution à une conférenceRevue par des pairs

Résumé

To thwart fault injection based attacks on critical embedded systems, designers of sensitive software use redundancy based countermeasure schemes. In some of these schemes, critical checks (i.e. conditionals) in the code are duplicated to ensure that an attacker cannot bypass such a check by flipping its result in order to get to a protected point (corresponding e.g. to a successful authentication or code integrity verification). This short paper presents a source-code-level verification technique of the correct implementation of such countermeasures. It is based on code instrumentation and deductive verification. The proposed technique was implemented in a tool prototype and evaluated on a real-life case study: the bootloader module of a secure USB storage device called WooKey, supposed to be resistant to fault injection attacks. We were able to prove the correctness of almost all redundant-check countermeasures in the module except two, and found an error in one of the unproven ones.

langue originaleAnglais
titreProceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, SAC 2022
EditeurAssociation for Computing Machinery
Pages1849-1852
Nombre de pages4
ISBN (Electronique)9781450387132
Les DOIs
étatPublié - 25 avr. 2022
Modification externeOui
Evénement37th ACM/SIGAPP Symposium on Applied Computing, SAC 2022 - Virtual, Online
Durée: 25 avr. 202229 avr. 2022

Série de publications

NomProceedings of the ACM Symposium on Applied Computing

Une conférence

Une conférence37th ACM/SIGAPP Symposium on Applied Computing, SAC 2022
La villeVirtual, Online
période25/04/2229/04/22

Empreinte digitale

Examiner les sujets de recherche de « Verifying Redundant-Check Based Countermeasures: A Case Study ». Ensemble, ils forment une empreinte digitale unique.

Contient cette citation