33 results
-
(On) The Impact of the Micro-architecture on the Masking Countermeasure against Side-Channel Attacks
Speaker : Lorenzo Casalino - CentraleSupélec, IRISA, Inria (SUSHI team)
The masking countermeasure constitutes a provably secure approach against side-channel attacks. Nonetheless, in the software context, the micro-architecture underlying a given CPU potentially induces information leakages undermining the masking's proven security.In this seminar, I will present the research work developed during my Ph.D. at CEA-List in Grenoble. This work addresses, along two axes,[…]-
SemSecuElec
-
Side-channel
-
Micro-architectural vulnerabilities
-
-
Code Encryption for Confidentiality and Execution Integrity down to Control Signals
Speaker : Théophile Gousselot - Mines Saint-Etienne, CEA, Leti, Centre CMP, F - 13541 Gardanne France
Embedded devices face software and physical fault injections to either extract or tamper with code in memory. The code execution and code intellectual property are threatened. Some existing countermeasures provide Control Flow Integrity (CFI) extended with the confidentiality and integrity of the instructions by chaining all of them through a cryptographic encryption primitive. While tampering[…]-
SemSecuElec
-
Fault injection
-
Micro-architectural vulnerabilities
-
Hardware countermeasures
-
-
Understanding and fighting fault injections with programming languages
Speaker : Sébastien Michelland - Université Grenoble Alpes, Grenoble INP, LCIS
Would your latest program produce correct results if I skipped a statement in it? Two? Corrupted a variable at random? Then it might not be robust against _fault injection attacks_, which target hardware directly and have such effects. To be fair, nothing really resists them; still, efforts in designing protections have come a long way, relying (perhaps surprisingly) in large part on hardening[…]-
SemSecuElec
-
Fault injection
-
-
Acquisition and Exploitation of Traces from Connected Devices
Speaker : Francesco Servida - École des Sciences Criminelles, Université de Lausanne
This presentation aims to give an overview of the traces that can be obtained from connected objects as witnesses or actors at a crime scene. Using several scenarios we cover the challenges of detecting connected devices, the relevant locations for data retrieval and the techniques for acquiring said data. We then present how such data can be useful in helping to understand the dynamics of events[…]-
SemSecuElec
-
Embedded systems
-
-
Security challenges and opportunities in emerging device technologies: a case study on flexible electronics
Speaker : Nele Mentens - KU Leuven, Belgium
While traditional chips in bulk silicon technology are widely used for reliable and highly ef?cient systems, there are applications that call for devices in other technologies. On the one hand, novel device technologies need to be re-evaluated with respect to potential threats and attacks, and how these can be faced with existing and novel security solutions and methods. On the other hand,[…] -
Side Channel Analysis: Instruction extraction and Information estimation
Speaker : Valence Cristiani
Side-channel usually aims at extracting cryptographic secrets from electronic devices through their physical leakages. However, these channels can leak other sensitive information. The first part of this talk will present a study of side channel-based disassembling (SCBD) that aims to recover instructions executed by a microcontroller. The main threat represented by SCBD is that it potentially[…]