High Level Model of Control Flow Attacks for Smart Card Functional Security

被引:10
|
作者
Berthome, P. [1 ]
Heydemann, K. [2 ]
Kauffmann-Tourkestansky, X. [1 ,3 ]
Lalande, J. -F. [1 ]
机构
[1] Ensi Bourges, LIFO, F-18000 Bourges, France
[2] Univ Paris 06, LIP6, F-75005 Paris, France
[3] Oberthur Technol, F-92726 Nanterre, France
关键词
smart card; physical attacks; security; tests;
D O I
10.1109/ARES.2012.79
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smart card software has to implement software countermeasures to face attacks. Some of these attacks are physical disruptions of chip components that cause a misbehavior in the code execution. A successful functional attack may reveal a secret or grant an undesired authorization. In this paper, we propose to model fault attacks at source level and then simulate these attacks to find out which ones are harmful. After discussing the effects of physical attacks at assembly level and going back to their consequences at source code level, the paper focuses on control flow attacks. Such attacks are good candidates for the proposed model that can be used to exhaustively test the robustness of the attacked program. On the bzip2 software, the paper's results show that up to 21% of the assembly simulated control flow attacks are covered by the C model with 30 times less test cases.
引用
收藏
页码:224 / 229
页数:6
相关论文
共 50 条
  • [31] Bi-level modelling of false data injection attacks on security constrained optimal power flow
    Khanna, Kush
    Panigrahi, Bijaya Ketan
    Joshi, Anupam
    IET GENERATION TRANSMISSION & DISTRIBUTION, 2017, 11 (14) : 3586 - 3593
  • [32] High level browser security in cloud computing services from cross site scripting attacks
    Malik, Medhavi
    Kumar, Mohit
    Kumar, Vinay
    Gautam, Arun Kumar
    Verma, Shikha
    Kumar, Sarvesh
    Goyal, Dinesh
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (04): : 1073 - 1081
  • [33] Fuzzy Inference System Application On High Level Security Model
    Obert, Martin
    Harakal, Marcel
    2019 COMMUNICATION AND INFORMATION TECHNOLOGIES (KIT 2019), 2019, : 14 - 22
  • [34] Information Flow Control with Decentralized Labeling Model in Information Security
    Hakkoymaz, Veli
    Bakir, Cigdem
    JOURNAL OF WEB ENGINEERING, 2020, 19 (7-8): : 903 - 930
  • [35] The hybrid model for web services security Access control and information flow control
    Kedjar, Saadia
    Tari, Abdelkamel
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 194 - +
  • [36] Enhancement of power system security level through the power flow control of UPFC
    Kim, SH
    Lim, JU
    Moon, SI
    2000 IEEE POWER ENGINEERING SOCIETY SUMMER MEETING, CONFERENCE PROCEEDINGS, VOLS 1-4, 2000, : 38 - 43
  • [37] A model of XML access control with dual-level security views
    Sun, W
    Liu, DX
    Wang, T
    ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 799 - 802
  • [38] An Action Based Access Control Model for Multi-level Security
    Su, Mang
    Li, Fenghua
    Shi, Guozhen
    Li, Li
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 359 - 366
  • [39] Security Control for LPV System With Deception Attacks via Model Predictive Control: A Dynamic Output Feedback Approach
    Wang, Jun
    Ding, Baocang
    Hu, Jianchen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (02) : 760 - 767
  • [40] Data flow requirements for integrating smart buildings and a smart grid through model predictive control
    Lawrence, Thomas M.
    Watson, Richard T.
    Boudreau, Marie-Claude
    Mohammadpour, Javad
    INTERNATIONAL HIGH-PERFORMANCE BUILT ENVIRONMENT CONFERENCE - A SUSTAINABLE BUILT ENVIRONMENT CONFERENCE 2016 SERIES (SBE16), IHBE 2016, 2017, 180 : 1402 - 1412