{"title":"Fault Attacks at the System Level - The Challenge of Securing Application Software","authors":"S. Mangard","doi":"10.1109/FDTC.2015.23","DOIUrl":null,"url":null,"abstract":"Summary form only given. During the last two decades, fault attacks on cryptographic algorithms have received significantly more attention in the academic community than fault attacks on application software. However, fault attacks on application software pose a serious threat in practice. Faults can for example be induced to bypass cryptographic functions or to obtain root access to a device. Such faults can be induced by physical means or as the recent publication of the Rowhammer attack has shown, faults can even be induced remotely. This talk provides an overview of attack techniques as well as of countermeasures to secure not only cryptography, but entire systems, against fault attacks.","PeriodicalId":444709,"journal":{"name":"2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)","volume":" 10","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FDTC.2015.23","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Summary form only given. During the last two decades, fault attacks on cryptographic algorithms have received significantly more attention in the academic community than fault attacks on application software. However, fault attacks on application software pose a serious threat in practice. Faults can for example be induced to bypass cryptographic functions or to obtain root access to a device. Such faults can be induced by physical means or as the recent publication of the Rowhammer attack has shown, faults can even be induced remotely. This talk provides an overview of attack techniques as well as of countermeasures to secure not only cryptography, but entire systems, against fault attacks.