33 results

  • (On) The Impact of the Micro-architecture on the Masking Countermeasure against Side-Channel Attacks

    • October 18, 2024 (11:00 - 12:00)

    • Inria Center of the University of Rennes - - Métivier room

    Speaker : Lorenzo Casalino - CentraleSupélec, IRISA, Inria (SUSHI team)

    The masking countermeasure constitutes a provably secure approach against side-channel attacks. Nonetheless, in the software context, the micro-architecture underlying a given CPU potentially induces information leakages undermining the masking's proven security.In this seminar, I will present the research work developed during my Ph.D. at CEA-List in Grenoble. This work addresses, along two axes,[…]
    • SemSecuElec

    • Side-channel

    • Micro-architectural vulnerabilities

  • Code Encryption for Confidentiality and Execution Integrity down to Control Signals

    • October 18, 2024 (10:00 - 11:00)

    • Inria Center of the University of Rennes - - Métivier room

    Speaker : Théophile Gousselot - Mines Saint-Etienne, CEA, Leti, Centre CMP, F - 13541 Gardanne France

    Embedded devices face software and physical fault injections to either extract or tamper with code in memory. The code execution and code intellectual property are threatened. Some existing countermeasures provide Control Flow Integrity (CFI) extended with the confidentiality and integrity of the instructions by chaining all of them through a cryptographic encryption primitive. While tampering[…]
    • SemSecuElec

    • Fault injection

    • Micro-architectural vulnerabilities

    • Hardware countermeasures

  • Understanding and fighting fault injections with programming languages

    • September 27, 2024 (11:00 - 12:00)

    • Inria Center of the University of Rennes - - Petri/Turing room

    Speaker : Sébastien Michelland - Université Grenoble Alpes, Grenoble INP, LCIS

    Would your latest program produce correct results if I skipped a statement in it? Two? Corrupted a variable at random? Then it might not be robust against _fault injection attacks_, which target hardware directly and have such effects. To be fair, nothing really resists them; still, efforts in designing protections have come a long way, relying (perhaps surprisingly) in large part on hardening[…]
    • SemSecuElec

    • Fault injection

  • Acquisition and Exploitation of Traces from Connected Devices

    • September 27, 2024 (10:00 - 11:00)

    • Inria Center of the University of Rennes - - Petri/Turing room

    Speaker : Francesco Servida - École des Sciences Criminelles, Université de Lausanne

    This presentation aims to give an overview of the traces that can be obtained from connected objects as witnesses or actors at a crime scene. Using several scenarios we cover the challenges of detecting connected devices, the relevant locations for data retrieval and the techniques for acquiring said data. We then present how such data can be useful in helping to understand the dynamics of events[…]
    • SemSecuElec

    • Embedded systems

  • Side Channel Analysis: Instruction extraction and Information estimation

    • May 06, 2022

    • CEA-LETI; Université de Montpellier, LIRMM - Salle Pétri/Turing

    Speaker : Valence Cristiani

    Side-channel usually aims at extracting cryptographic secrets from electronic devices through their physical leakages. However, these channels can leak other sensitive information. The first part of this talk will present a study of side channel-based disassembling (SCBD) that aims to recover instructions executed by a microcontroller. The main threat represented by SCBD is that it potentially[…]
  • Security challenges and opportunities in emerging device technologies: a case study on flexible electronics

    • May 06, 2022

    • Leiden University, The Netherlands?, and KU Leuven, Belgium - Salle Pétri/Turing

    Speaker : Nele Mentens - KU Leuven, Belgium

    While traditional chips in bulk silicon technology are widely used for reliable and highly ef?cient systems, there are applications that call for devices in other technologies. On the one hand, novel device technologies need to be re-evaluated with respect to potential threats and attacks, and how these can be faced with existing and novel security solutions and methods. On the other hand,[…]