Combined software and hardware fault injection vulnerability detection

被引:12
|
作者
Given-Wilson, Thomas [1 ]
Jafri, Nisrine [2 ]
Legay, Axel [1 ]
机构
[1] Catholic Univ Louvain, Pl Sainte Barbe 2 Bte L5-02-01, B-1348 Louvain La Neuve, Belgium
[2] CEA, 17 Ave Martyrs, F-38000 Grenoble, France
关键词
Fault injection; Vulnerability; Statistical model checking; Formal methods; EMP;
D O I
10.1007/s11334-020-00364-5
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Fault injection is a well-known method to test the robustness and security vulnerabilities of software. Software-based and hardware-based approaches have been used to detect fault injection vulnerabilities. Software-based approaches typically rely upon simulations that can provide broad and rapid coverage, but may not correlate with genuine hardware vulnerabilities. Hardware-based experiments are indisputable in their results, but rely upon expensive expert knowledge and manual testing yielding ad hoc and extremely limited results. Further, there is very limited connection between software-based simulation results and hardware-based experiments. This work bridges software-based and hardware-based fault injection vulnerability detection by contrasting results of both approaches. This demonstrates that: not all software-based vulnerabilities can be reproduced in hardware; prior conjectures on the fault model for electromagnetic pulse attacks may not be accurate; and that there is a co-relation between software-based and hardware-based approaches. Further, combining both approaches can yield a vastly more accurate and efficient approach to detecting genuine fault injection vulnerabilities.
引用
收藏
页码:101 / 120
页数:20
相关论文
共 50 条
  • [1] Combined software and hardware fault injection vulnerability detection
    Thomas Given-Wilson
    Nisrine Jafri
    Axel Legay
    [J]. Innovations in Systems and Software Engineering, 2020, 16 : 101 - 120
  • [2] The State of Fault Injection Vulnerability Detection
    Given-Wilson, Thomas
    Jafri, Nisrine
    Legay, Axel
    [J]. VERIFICATION AND EVALUATION OF COMPUTER AND COMMUNICATION SYSTEMS, 2018, 11181 : 3 - 21
  • [3] SEFI Cross-section Evaluation by Fault Injection Software Approach and Hardware Detection
    Loskutov, I. O.
    Nekrasov, P. V.
    Shilovskiy, I. I. Shvetsov
    Boychenko, D. V.
    Uzhegov, V. M.
    [J]. 2017 IEEE 30TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS (MIEL), 2017, : 251 - 254
  • [4] Automated Software Diversity for Hardware Fault Detection
    Gaiswinkler, Gerald
    Gerstinger, Andreas
    [J]. 2009 IEEE CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (EFTA 2009), 2009,
  • [5] Fault Injection Technology for Software Vulnerability Testing Based on Xen
    Zeng, Fanping
    Li, Juan
    Li, Ling
    Wang, Xufa
    [J]. 2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 4, PROCEEDINGS, 2009, : 206 - 210
  • [6] Hardware and software fault simulation
    Stroph, R
    Clarke, T
    [J]. INTERNATIONAL CONFERENCE ON SIMULATION '98, 1998, (457): : 413 - 419
  • [7] Hardware fault injection with UMLinux
    Buchacker, K
    Dal Cin, M
    Höxer, HJ
    Sieh, V
    Tschäche, O
    Waitz, M
    [J]. 2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 670 - 670
  • [8] Software Vulnerability Detection Methodology Combined with Static and Dynamic Analysis
    Kim, Seokmo
    Kim, R. Young Chul
    Park, Young B.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (03) : 777 - 793
  • [9] Software Vulnerability Detection Methodology Combined with Static and Dynamic Analysis
    Seokmo Kim
    R. Young Chul Kim
    Young B. Park
    [J]. Wireless Personal Communications, 2016, 89 : 777 - 793
  • [10] Reconfigurable Hardware Technology: an Emerging Paradigm for Combined Software-Hardware Fault-tolerance Implementation
    Szasz, Cs.
    [J]. CONTROL ENGINEERING AND APPLIED INFORMATICS, 2018, 20 (03): : 99 - 108