Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Emmanuelle Encrenaz is active.

Publication


Featured researches published by Emmanuelle Encrenaz.


workshop on fault diagnosis and tolerance in cryptography | 2013

Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller

Nicolas Moro; Amine Dehbaoui; Karine Heydemann; Bruno Robisson; Emmanuelle Encrenaz

Injection of transient faults as a way to attack cryptographic implementations has been largely studied in the last decade. Several attacks that use electromagnetic fault injection against hardware or software architectures have already been presented. On micro controllers, electromagnetic fault injection has mostly been seen as a way to skip assembly instructions or subroutine calls. However, to the best of our knowledge, no precise study about the impact of an electromagnetic glitch fault injection on a micro controller has been proposed yet. The aim of this paper is twofold: providing a more in-depth study of the effects of electromagnetic glitch fault injection on a state-of-the-art micro controller and building an associated register-transfer level fault model.


Journal of Cryptographic Engineering | 2014

Formal verification of a software countermeasure against instruction skip attacks

Nicolas Moro; Karine Heydemann; Emmanuelle Encrenaz; Bruno Robisson

Fault attacks against embedded circuits enabled to define many new attack paths against secure circuits. Every attack path relies on a specific fault model which defines the type of faults that the attacker can perform. On embedded processors, a fault model consisting in an assembly instruction skip can be very useful for an attacker and has been obtained by using several fault injection means. To avoid this threat, some countermeasure schemes which rely on temporal redundancy have been proposed. Nevertheless, double fault injection in a long enough time interval is practical and can bypass those countermeasure schemes. Some fine-grained countermeasure schemes have also been proposed for specific instructions. However, to the best of our knowledge, no approach that enables to secure a generic assembly program in order to make it fault-tolerant to instruction skip attacks has been formally proven yet. In this paper, we provide a fault-tolerant replacement sequence for almost all the instructions of the Thumb-2 instruction set and provide a formal verification for this fault tolerance. This simple transformation enables to add a reasonably good security level to an embedded program and makes practical fault injection attacks much harder to achieve.


hardware-oriented security and trust | 2014

Experimental evaluation of two software countermeasures against fault attacks

Nicolas Moro; Karine Heydemann; Amine Dehbaoui; Bruno Robisson; Emmanuelle Encrenaz

Injection of transient faults can be used as a way to attack embedded systems. On embedded processors such as microcontrollers, several studies showed that such a transient fault injection with glitches or electromagnetic pulses could corrupt either the data loads from the memory or the assembly instructions executed by the circuit. Some countermeasure schemes which rely on temporal redundancy have been proposed to handle this issue. Among them, several schemes add this redundancy at assembly instruction level. In this paper, we perform a practical evaluation for two of those countermeasure schemes by using a pulsed electromagnetic fault injection process on a 32-bit microcontroller. We provide some necessary conditions for an efficient implementation of those countermeasure schemes in practice. We also evaluate their efficiency and highlight their limitations. To the best of our knowledge, no experimental evaluation of the security of such instruction-level countermeasure schemes has been published yet.


smart card research and advanced application conference | 2015

Efficient Design and Evaluation of Countermeasures against Fault Attacks Using Formal Verification

Lucien Goubet; Karine Heydemann; Emmanuelle Encrenaz; Ronald De Keulenaer

This paper presents a formal verification framework and tool that evaluates the robustness of software countermeasures against fault-injection attacks. By modeling reference assembly code and its protected variant as automata, the framework can generate a set of equations for an SMT solver, the solutions of which represent possible attack paths. Using the tool we developed, we evaluated the robustness of state-of-the-art countermeasures against fault injection attacks. Based on insights gathered from this evaluation, we analyze any remaining weaknesses and propose applications of these countermeasures that are more robust.


european conference on parallel processing | 2013

A Formally Verified Static Hypervisor with Hardware Support for a Many-Core Chip

Geoffrey Plouviez; Emmanuelle Encrenaz; Franck Wajsbürt

This work presents a co-hosting approach of multiple software stacks within a many-core system-on-chip.


rapid system prototyping | 2014

FSM-based properties and abstraction of components

Syed Hussein Syed Alwi; Emmanuelle Encrenaz

Generating a good abstraction is not an easy task in a model-checking process. A bad abstraction will not only fail the verification but may also lead to numerous unsuccessful refinements due to weak counterexamples. Therefore, the abstraction has to be wisely built in order to attain the verification objective. A property satisfied by a component is a natural abstraction of it. However, the lack of pertinent properties in the selection pool is a hurdle to exploit them for abstraction generation. Considering a system made of synchronous components on which a global property has to be verified, we present a method to generate properties which are directly derived from the component?s FSM. Then we propose to build abstractions by selecting among these properties, those describing variable activation flow related to the global property to be verified. Several experimentations conducted on a realistic CAN bus platform illustrate its applicability and potential benefits.


arXiv: Logic in Computer Science | 2018

Modeling a Cache Coherence Protocol with the Guarded Action Language

Quentin L. Meunier; Yann Thierry-Mieg; Emmanuelle Encrenaz


PROOFS@CHES | 2017

Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes.

Inès Ben El Ouahma; Quentin L. Meunier; Karine Heydemann; Emmanuelle Encrenaz


TRUDEVICE 2014 | 2014

Fault attacks on two software countermeasures

Nicolas Moro; Karine Heydemann; Amine Dehbaoui; Bruno Robisson; Emmanuelle Encrenaz


Chip-to-Cloud Security Forum 2013 | 2013

Electromagnetic fault injection on microcontrollers

Nicolas Moro; Amine Dehbaoui; Karine Heydemann; Bruno Robisson; Emmanuelle Encrenaz

Collaboration


Dive into the Emmanuelle Encrenaz's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Amine Dehbaoui

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Assia Tria

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yann Thierry-Mieg

Centre national de la recherche scientifique

View shared research outputs
Researchain Logo
Decentralizing Knowledge