High Level Model of Control Flow Attacks for Smart Card Functional Security

被引:10
|
作者
Berthome, P. [1 ]
Heydemann, K. [2 ]
Kauffmann-Tourkestansky, X. [1 ,3 ]
Lalande, J. -F. [1 ]
机构
[1] Ensi Bourges, LIFO, F-18000 Bourges, France
[2] Univ Paris 06, LIP6, F-75005 Paris, France
[3] Oberthur Technol, F-92726 Nanterre, France
关键词
smart card; physical attacks; security; tests;
D O I
10.1109/ARES.2012.79
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smart card software has to implement software countermeasures to face attacks. Some of these attacks are physical disruptions of chip components that cause a misbehavior in the code execution. A successful functional attack may reveal a secret or grant an undesired authorization. In this paper, we propose to model fault attacks at source level and then simulate these attacks to find out which ones are harmful. After discussing the effects of physical attacks at assembly level and going back to their consequences at source code level, the paper focuses on control flow attacks. Such attacks are good candidates for the proposed model that can be used to exhaustively test the robustness of the attacked program. On the bzip2 software, the paper's results show that up to 21% of the assembly simulated control flow attacks are covered by the C model with 30 times less test cases.
引用
收藏
页码:224 / 229
页数:6
相关论文
共 50 条
  • [21] An Information Flow Security Model for Home Area Network of Smart Grid
    Tong, Jizhou
    Sun, Weiqing
    Wang, Lingfeng
    2013 IEEE 3RD ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL AND INTELLIGENT SYSTEMS (CYBER), 2013, : 456 - +
  • [22] Level flow control model by numerical physical model
    Fujisaki, K
    CONFERENCE RECORD OF THE 2002 IEEE INDUSTRY APPLICATIONS CONFERENCE, VOLS 1-4, 2002, : 169 - 175
  • [23] A high-level model for a healthy smart city
    Urzaiz, Gabriel
    Hervás, Ramón
    Fontecha, Jesús
    Bravo, José
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8868 : 386 - 389
  • [24] Formally verified software countermeasures for control-flow integrity of smart card C code
    Heydemann, Karine
    Lalande, Jean-Francois
    Berthome, Pascal
    COMPUTERS & SECURITY, 2019, 85 : 202 - 224
  • [25] Security Information Flow Control Model and Method in MILS
    Zhou Yinping
    Shen Yulong
    Pei Qingqi
    Cui Xining
    Li Yahui
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 591 - 595
  • [26] An Extended Model of a Level and Flow Control System
    Siljak, H.
    Hivziefendic, J.
    Kevric, J.
    2017 40TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2017, : 603 - 607
  • [27] Dynamic Access Control Model for Security Client Services in Smart Grid
    Yeo, Sang-Soo
    Kim, Si-Jung
    Cho, Do-Eun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [28] Web-based Multi-level Smart Card Access Control System on University Campus
    Du, Zhao
    Tang, Yeming
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 1015 - 1018
  • [29] Access control system with high level security using fingerprints
    Gil, Y
    Ahn, D
    Pan, S
    Chung, Y
    32ND APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP, PROCEEDINGS, 2004, : 238 - 243
  • [30] Network-Level Security and Privacy Control for Smart-Home IoT Devices
    Sivaraman, Vijay
    Gharakheili, Hassan Habibi
    Vishwanath, Arun
    Boreli, Roksana
    Mehani, Olivier
    2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2015, : 163 - 167