33 résultats

  • (On) The Impact of the Micro-architecture on the Masking Countermeasure against Side-Channel Attacks

    • 18 octobre 2024 (11:00 - 12:00)

    • Inria Center of the University of Rennes - - Métivier room

    Orateur : Lorenzo Casalino - CentraleSupélec, IRISA, Inria (SUSHI team)

    The masking countermeasure constitutes a provably secure approach against side-channel attacks. Nonetheless, in the software context, the micro-architecture underlying a given CPU potentially induces information leakages undermining the masking's proven security.In this seminar, I will present the research work developed during my Ph.D. at CEA-List in Grenoble. This work addresses, along two axes,[…]
    • SemSecuElec

    • Canaux auxiliaires

    • Vulnérabilités micro-architecturales

  • Code Encryption for Confidentiality and Execution Integrity down to Control Signals

    • 18 octobre 2024 (10:00 - 11:00)

    • Inria Center of the University of Rennes - - Métivier room

    Orateur : Théophile Gousselot - Mines Saint-Etienne, CEA, Leti, Centre CMP, F - 13541 Gardanne France

    Embedded devices face software and physical fault injections to either extract or tamper with code in memory. The code execution and code intellectual property are threatened. Some existing countermeasures provide Control Flow Integrity (CFI) extended with the confidentiality and integrity of the instructions by chaining all of them through a cryptographic encryption primitive. While tampering[…]
    • SemSecuElec

    • Injection de fautes

    • Vulnérabilités micro-architecturales

    • Contremesures matérielles

  • Understanding and fighting fault injections with programming languages

    • 27 septembre 2024 (11:00 - 12:00)

    • Inria Center of the University of Rennes - - Petri/Turing room

    Orateur : Sébastien Michelland - Université Grenoble Alpes, Grenoble INP, LCIS

    Would your latest program produce correct results if I skipped a statement in it? Two? Corrupted a variable at random? Then it might not be robust against _fault injection attacks_, which target hardware directly and have such effects. To be fair, nothing really resists them; still, efforts in designing protections have come a long way, relying (perhaps surprisingly) in large part on hardening[…]
    • SemSecuElec

    • Injection de fautes

  • Acquisition and Exploitation of Traces from Connected Devices

    • 27 septembre 2024 (10:00 - 11:00)

    • Inria Center of the University of Rennes - - Petri/Turing room

    Orateur : Francesco Servida - École des Sciences Criminelles, Université de Lausanne

    This presentation aims to give an overview of the traces that can be obtained from connected objects as witnesses or actors at a crime scene. Using several scenarios we cover the challenges of detecting connected devices, the relevant locations for data retrieval and the techniques for acquiring said data. We then present how such data can be useful in helping to understand the dynamics of events[…]
    • SemSecuElec

    • Systèmes embarqués

  • Side Channel Analysis: Instruction extraction and Information estimation

    • 06 mai 2022

    • CEA-LETI; Université de Montpellier, LIRMM - Salle Pétri/Turing

    Orateur : Valence Cristiani

    Side-channel usually aims at extracting cryptographic secrets from electronic devices through their physical leakages. However, these channels can leak other sensitive information. The first part of this talk will present a study of side channel-based disassembling (SCBD) that aims to recover instructions executed by a microcontroller. The main threat represented by SCBD is that it potentially[…]
  • Security challenges and opportunities in emerging device technologies: a case study on flexible electronics

    • 06 mai 2022

    • Inria Center of the University of Rennes - Espace de conférences

    Orateur : Nele Mentens - KU Leuven, Belgium

    While traditional chips in bulk silicon technology are widely used for reliable and highly ef?cient systems, there are applications that call for devices in other technologies. On the one hand, novel device technologies need to be re-evaluated with respect to potential threats and attacks, and how these can be faced with existing and novel security solutions and methods. On the other hand,[…]