High Level Model of Control Flow Attacks for Smart Card Functional Security

被引:10
|
作者
Berthome, P. [1 ]
Heydemann, K. [2 ]
Kauffmann-Tourkestansky, X. [1 ,3 ]
Lalande, J. -F. [1 ]
机构
[1] Ensi Bourges, LIFO, F-18000 Bourges, France
[2] Univ Paris 06, LIP6, F-75005 Paris, France
[3] Oberthur Technol, F-92726 Nanterre, France
关键词
smart card; physical attacks; security; tests;
D O I
10.1109/ARES.2012.79
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smart card software has to implement software countermeasures to face attacks. Some of these attacks are physical disruptions of chip components that cause a misbehavior in the code execution. A successful functional attack may reveal a secret or grant an undesired authorization. In this paper, we propose to model fault attacks at source level and then simulate these attacks to find out which ones are harmful. After discussing the effects of physical attacks at assembly level and going back to their consequences at source code level, the paper focuses on control flow attacks. Such attacks are good candidates for the proposed model that can be used to exhaustively test the robustness of the attacked program. On the bzip2 software, the paper's results show that up to 21% of the assembly simulated control flow attacks are covered by the C model with 30 times less test cases.
引用
收藏
页码:224 / 229
页数:6
相关论文
共 50 条
  • [41] Main Control Computer Security Model of Closed Network Systems Protection against Cyber Attacks
    Seymen, Bilal
    CYBER SENSING 2014, 2014, 9097
  • [42] Single Board Computer Based Building Security Management System: Contactless Smart Card for Automatic Door Access Control System
    Atmojo, Udayanto Dwi
    Atmojo, Udayanto Dwi
    Litasari
    Irfansyah, Astria Nur
    MECHANICAL AND AEROSPACE ENGINEERING, PTS 1-7, 2012, 110-116 : 4816 - +
  • [43] High-level model for the design of KPIs for smart cities systems
    Orłowski C.
    Ziółkowski A.
    Orłowski A.
    Kapłański P.
    Sitek T.
    Pokrzywnicki W.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, 9990 LNCS : 1 - 14
  • [44] Dynamic event-triggered security control for networked control systems with cyber-attacks: A model predictive control approach
    Li, Bin
    Zhou, Xinglian
    Ning, Zhaoke
    Guan, Xiaoyi
    Yiu, Ka-Fai Cedric
    INFORMATION SCIENCES, 2022, 612 : 384 - 398
  • [45] Trust Model Based on Structured Protection for High Level Security System
    Liao Jianhua
    Zhao Yong
    Zhan Jing
    CHINA COMMUNICATIONS, 2012, 9 (11) : 70 - 77
  • [46] Enhanced Intelligent Smart Home Control and Security System Based on Deep Learning Model
    Taiwo, Olutosin
    Ezugwu, Absalom E.
    Oyelade, Olaide N.
    Almutairi, Mubarak S.
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [47] Smart grids cyber-physical security: Parameter correction model against unbalanced false data injection attacks
    Zou, Tierui
    Bretas, Arturo S.
    Ruben, Cody
    Dhulipala, Surya C.
    Bretas, Newton
    ELECTRIC POWER SYSTEMS RESEARCH, 2020, 187
  • [48] A high-precision heuristic model to detect home and work locations from smart card data
    Aslam, Nilufer Sari
    Cheng, Tao
    Cheshire, James
    GEO-SPATIAL INFORMATION SCIENCE, 2019, 22 (01) : 1 - 11
  • [49] Functional model of expert traffic flow control system within high-speed transportation corridors
    Sysoev, A. S.
    Khabibullina, E. L.
    APPLIED MATHEMATICS, COMPUTATIONAL SCIENCE AND MECHANICS: CURRENT PROBLEMS, 2020, 1479
  • [50] Network Security Model for Analyzing Network-Based Control Systems under Denial of Service Attacks
    Long, Men
    Wu, Chwan-Hwa 'John'
    Hung, John Y.
    Irwin, J. David
    IECON 2004: 30TH ANNUAL CONFERENCE OF IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOL 3, 2004, : 2739 - 2744