Rewrite to Reinforce: Rewriting the Binary to Apply Countermeasures against Fault Injection

被引:5
|
作者
Kiaei, Pantea [1 ]
Breunesse, Cces-Bart [2 ]
Ahmadi, Mohsen [3 ]
Schaumont, Patrick [1 ]
van Woudenberg, Jasper [2 ]
机构
[1] Worcester Poltech Inst, ECE Dept, Worcester, MA 01609 USA
[2] Risucre, San Francisco, CA 94108 USA
[3] Arizona State Univ, Tempe, AZ 85281 USA
关键词
Fault injection; binary protection; targeted countermeasures; automated countermeasure; binary rewriting;
D O I
10.1109/DAC18074.2021.9586278
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fault injection attacks can cause errors in software for malicious purposes. Oftentimes, vulnerable points of a program are detected after its development. It is therefore critical for the user of the program to be able to apply last-minute security assurance to the executable file without having access to the source code. In this work, we explore two methodologies based on binary rewriting that aid in injecting countermeasures in the binary file. The first approach injects countermeasures by reassembling the disassembly whereas the second approach leverages a full translation to a high-level IR and lowering that back to the target architecture.
引用
收藏
页码:319 / 324
页数:6
相关论文
共 50 条
  • [41] New Countermeasures against Fault and Software Type Confusion Attacks on Java']Java Cards
    Barbu, Guillaume
    Giraud, Christophe
    [J]. INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : 57 - 75
  • [42] Faultprog: Testing the Accuracy of Binary-Level Software Fault Injection
    Cotroneo, Domenico
    Lanzaro, Anna
    Natella, Roberto
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (01) : 40 - 53
  • [43] Profit-Oriented False Data Injection Attack Against Wind Farms and Countermeasures
    Bi, Wenjun
    Chen, Guo
    Zhang, Kaifeng
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 3700 - 3710
  • [44] Fault Injection Framework for Assessing Fault Containment of TTEthernet against Babbling Idiot Failures
    Daniel, Onwuchekwa
    Roman, Obermaisser
    [J]. 2018 IEEE/ACM 26TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2018,
  • [45] Modelling and Countermeasures of False Data Injection Attacks Against State Estimation in Power Systems
    Alayande, Akintunde Samson
    Nwulu, Nnamdi
    Bakare, Ayodeji Emmanuel
    [J]. PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), 2018, : 129 - 134
  • [46] An Embedded Digital Sensor Against EM and BB Fault Injection
    El-baze, David
    Rigaud, Jean-Baptiste
    Maurine, Philippe
    [J]. 2016 WORKSHOP ON FAULT AND TOLERANCE IN CRYPTOGRAPHY (FDTC), 2016, : 78 - 86
  • [47] Experimental Analysis of Binary-Level Software Fault Injection in Complex Software
    Cotroneo, Domenico
    Lanzaro, Anna
    Natella, Roberto
    Barbosa, Ricardo
    [J]. 2012 NINTH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2012), 2012, : 162 - 172
  • [48] B-SEFI:A Binary Level Soft Error Fault Injection Tool
    Wang, Ying
    Dong, Jian
    Zhang, Sen
    Zuo, Decheng
    [J]. 2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019), 2019, : 235 - 241
  • [49] Determining Countermeasures against Fault Currents Using a Decomposition Method Based on Fuzzy Fault Level Constrained Optimal Power Flow
    Flores, BenJeMar-Hope
    Song, Hwachang
    [J]. APPLIED SCIENCES-BASEL, 2019, 9 (02):
  • [50] Cross-layer analysis of software fault models and countermeasures against hardware fault attacks in a RISC-V processor
    Laurent, Johan
    Beroulle, Vincent
    Deleuze, Christophe
    Pebay-Peyroula, Florian
    Papadimitriou, Athanasios
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2019, 71