33 results

  • One Fault Can Go A Long Way

    • November 15, 2019

    • Nanyang Technological University - Métivier

    Speaker : Shivam Bhasin

    *Abstract:* Fault attacks are considered among critical threat to embedded cryptography. This talk will be divided into in two parts. The first part of the talk will explore application of faults on advanced security primitives. We present persistent fault analysis introduced at CHES 2017 and its capability to bypass state of the art fault countermeasures as well as higher-order masking with one[…]
  • Laser-Based Attacks Against FPGA Bitstream Encryption

    • June 07, 2019

    • Technische Universität Berlin - Salles Petri/Turing

    Speaker : Heiko Lohrke

    Field programmable gate arrays (FPGAs) use encryption to protect the configuration data or “bitstream” containing the design to be run on the device. This encryption aims at protecting the intellectual property and other secrets contained in the bitstream and preventing e.g. cloning or tampering with an FPGA implementation.This talk will demonstrate how attackers can use failure analysis equipment[…]
  • Challenges related to random number generation for cryptographic applications

    • June 07, 2019

    • Laboratoire Hubert Curien - Salles Petri/Turing

    Speaker : Elie Noumon Allini

    The main purpose of cryptography is to ensure secure communication. In order to achieve this goal, cryptographic schemes make an intensive use of random numbers. Given that the security of these schemes highly depends on these numbers, it is important to produce high-quality random numbers. Knowing that most cryptographic modules are nowadays implemented in logic devices, we investigated True[…]
  • Do Not Trust Modern System-on-Chips - Electromagnetic fault injection against a System-on-Chip

    • May 10, 2019

    • INRIA - Salles Petri/Turing

    Speaker : Ronan Lashermes

    Electromagnetic fault injection (EMFI) is a well known technique to disturb the behavior of a chip and weaken its security. These attacks are still mostly done on simple microcontrollers since the fault effects is relatively simple and understood.Unlocking EMFI on modern System-on-Chips (SoCs), the fast and complex chips ubiquitous today, requires to understand the impact of the faults. In this[…]
  • Automated software protection for the masses against side-channel attacks

    • May 10, 2019

    • Univ Grenoble Alpes, CEA, List - Salles Petri/Turing

    Speaker : Nicolas Belleville

    This presentation will present an approach and a tool that answer the need for effective, generic, and easily applicable protections against side-channel attacks. The protection mechanism is based on code polymorphism, so that the observable behaviour of the protected component is variable and unpredictable to the attacker. Our approach combines lightweight specialized runtime code generation with[…]
  • TRAITOR : a multi clock-glitch attack platform reproducing EMI effects at low-cost

    • April 05, 2019

    • INRIA - Salles Pétri/Turing

    Speaker : Ludovic Claudepierre

    Electromagnetic injection (EMI) is a common and non-invasive technique used to perform fault attacks. In that case, an electromagnetic wave is radiated by an antenna in the close vicinity of the targeted microcontroller (STM32 in our case).The clock signal is generated thanks to a Phase-Locked-Loop (PLL). The PLL is highly sensitive to EMI and then induces severe disruption on the clock signal[…]