Emmanuelle Encrenaz
University of Paris
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Emmanuelle Encrenaz.
workshop on fault diagnosis and tolerance in cryptography | 2013
Nicolas Moro; Amine Dehbaoui; Karine Heydemann; Bruno Robisson; Emmanuelle Encrenaz
Injection of transient faults as a way to attack cryptographic implementations has been largely studied in the last decade. Several attacks that use electromagnetic fault injection against hardware or software architectures have already been presented. On micro controllers, electromagnetic fault injection has mostly been seen as a way to skip assembly instructions or subroutine calls. However, to the best of our knowledge, no precise study about the impact of an electromagnetic glitch fault injection on a micro controller has been proposed yet. The aim of this paper is twofold: providing a more in-depth study of the effects of electromagnetic glitch fault injection on a state-of-the-art micro controller and building an associated register-transfer level fault model.
Journal of Cryptographic Engineering | 2014
Nicolas Moro; Karine Heydemann; Emmanuelle Encrenaz; Bruno Robisson
Fault attacks against embedded circuits enabled to define many new attack paths against secure circuits. Every attack path relies on a specific fault model which defines the type of faults that the attacker can perform. On embedded processors, a fault model consisting in an assembly instruction skip can be very useful for an attacker and has been obtained by using several fault injection means. To avoid this threat, some countermeasure schemes which rely on temporal redundancy have been proposed. Nevertheless, double fault injection in a long enough time interval is practical and can bypass those countermeasure schemes. Some fine-grained countermeasure schemes have also been proposed for specific instructions. However, to the best of our knowledge, no approach that enables to secure a generic assembly program in order to make it fault-tolerant to instruction skip attacks has been formally proven yet. In this paper, we provide a fault-tolerant replacement sequence for almost all the instructions of the Thumb-2 instruction set and provide a formal verification for this fault tolerance. This simple transformation enables to add a reasonably good security level to an embedded program and makes practical fault injection attacks much harder to achieve.
hardware-oriented security and trust | 2014
Nicolas Moro; Karine Heydemann; Amine Dehbaoui; Bruno Robisson; Emmanuelle Encrenaz
Injection of transient faults can be used as a way to attack embedded systems. On embedded processors such as microcontrollers, several studies showed that such a transient fault injection with glitches or electromagnetic pulses could corrupt either the data loads from the memory or the assembly instructions executed by the circuit. Some countermeasure schemes which rely on temporal redundancy have been proposed to handle this issue. Among them, several schemes add this redundancy at assembly instruction level. In this paper, we perform a practical evaluation for two of those countermeasure schemes by using a pulsed electromagnetic fault injection process on a 32-bit microcontroller. We provide some necessary conditions for an efficient implementation of those countermeasure schemes in practice. We also evaluate their efficiency and highlight their limitations. To the best of our knowledge, no experimental evaluation of the security of such instruction-level countermeasure schemes has been published yet.
smart card research and advanced application conference | 2015
Lucien Goubet; Karine Heydemann; Emmanuelle Encrenaz; Ronald De Keulenaer
This paper presents a formal verification framework and tool that evaluates the robustness of software countermeasures against fault-injection attacks. By modeling reference assembly code and its protected variant as automata, the framework can generate a set of equations for an SMT solver, the solutions of which represent possible attack paths. Using the tool we developed, we evaluated the robustness of state-of-the-art countermeasures against fault injection attacks. Based on insights gathered from this evaluation, we analyze any remaining weaknesses and propose applications of these countermeasures that are more robust.
european conference on parallel processing | 2013
Geoffrey Plouviez; Emmanuelle Encrenaz; Franck Wajsbürt
This work presents a co-hosting approach of multiple software stacks within a many-core system-on-chip.
rapid system prototyping | 2014
Syed Hussein Syed Alwi; Emmanuelle Encrenaz
Generating a good abstraction is not an easy task in a model-checking process. A bad abstraction will not only fail the verification but may also lead to numerous unsuccessful refinements due to weak counterexamples. Therefore, the abstraction has to be wisely built in order to attain the verification objective. A property satisfied by a component is a natural abstraction of it. However, the lack of pertinent properties in the selection pool is a hurdle to exploit them for abstraction generation. Considering a system made of synchronous components on which a global property has to be verified, we present a method to generate properties which are directly derived from the component?s FSM. Then we propose to build abstractions by selecting among these properties, those describing variable activation flow related to the global property to be verified. Several experimentations conducted on a realistic CAN bus platform illustrate its applicability and potential benefits.
arXiv: Logic in Computer Science | 2018
Quentin L. Meunier; Yann Thierry-Mieg; Emmanuelle Encrenaz
PROOFS@CHES | 2017
Inès Ben El Ouahma; Quentin L. Meunier; Karine Heydemann; Emmanuelle Encrenaz
TRUDEVICE 2014 | 2014
Nicolas Moro; Karine Heydemann; Amine Dehbaoui; Bruno Robisson; Emmanuelle Encrenaz
Chip-to-Cloud Security Forum 2013 | 2013
Nicolas Moro; Amine Dehbaoui; Karine Heydemann; Bruno Robisson; Emmanuelle Encrenaz