33 résultats

  • One Fault Can Go A Long Way

    • 15 novembre 2019

    • Nanyang Technological University - Métivier

    Orateur : Shivam Bhasin

    *Abstract:* Fault attacks are considered among critical threat to embedded cryptography. This talk will be divided into in two parts. The first part of the talk will explore application of faults on advanced security primitives. We present persistent fault analysis introduced at CHES 2017 and its capability to bypass state of the art fault countermeasures as well as higher-order masking with one[…]
  • Challenges related to random number generation for cryptographic applications

    • 07 juin 2019

    • Laboratoire Hubert Curien - Salles Petri/Turing

    Orateur : Elie Noumon Allini

    The main purpose of cryptography is to ensure secure communication. In order to achieve this goal, cryptographic schemes make an intensive use of random numbers. Given that the security of these schemes highly depends on these numbers, it is important to produce high-quality random numbers. Knowing that most cryptographic modules are nowadays implemented in logic devices, we investigated True[…]
  • Laser-Based Attacks Against FPGA Bitstream Encryption

    • 07 juin 2019

    • Technische Universität Berlin - Salles Petri/Turing

    Orateur : Heiko Lohrke

    Field programmable gate arrays (FPGAs) use encryption to protect the configuration data or “bitstream” containing the design to be run on the device. This encryption aims at protecting the intellectual property and other secrets contained in the bitstream and preventing e.g. cloning or tampering with an FPGA implementation.This talk will demonstrate how attackers can use failure analysis equipment[…]
  • Do Not Trust Modern System-on-Chips - Electromagnetic fault injection against a System-on-Chip

    • 10 mai 2019

    • INRIA - Salles Petri/Turing

    Orateur : Ronan Lashermes

    Electromagnetic fault injection (EMFI) is a well known technique to disturb the behavior of a chip and weaken its security. These attacks are still mostly done on simple microcontrollers since the fault effects is relatively simple and understood.Unlocking EMFI on modern System-on-Chips (SoCs), the fast and complex chips ubiquitous today, requires to understand the impact of the faults. In this[…]
  • Automated software protection for the masses against side-channel attacks

    • 10 mai 2019

    • Univ Grenoble Alpes, CEA, List - Salles Petri/Turing

    Orateur : Nicolas Belleville

    This presentation will present an approach and a tool that answer the need for effective, generic, and easily applicable protections against side-channel attacks. The protection mechanism is based on code polymorphism, so that the observable behaviour of the protected component is variable and unpredictable to the attacker. Our approach combines lightweight specialized runtime code generation with[…]
  • Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages

    • 05 avril 2019

    • Faculté des sciences de Limoges - Salles Pétri/Turing

    Orateur : Léo Reynaud

    Les attaques side channel classiques nécessitent généralement la connaissance du clair (ou du chiffré) afin de calculer des données internes qui seront comparées à des fuites. Des attaques permettent cependant de s’affranchir de ces connaissances, les attaques par distributions jointes. Ces attaques supposent un attaquant capable d’inverser le modèle de consommation, mais aucune connaissance sur[…]