Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Pablo Rauzy is active.

Publication


Featured researches published by Pablo Rauzy.


hardware oriented security and trust | 2015

High precision fault injections on the instruction cache of ARMv7-M architectures

Lionel Rivière; Zakaria Najm; Pablo Rauzy; Jean-Luc Danger; Julien Bringer; Laurent Sauvage

Hardware and software of secured embedded systems are prone to physical attacks. In particular, fault injection attacks revealed vulnerabilities on the data and the control flow allowing an attacker to break cryptographic or secured algorithms implementations. While many research studies concentrated on successful attacks on the data flow, only a few targets the instruction flow. In this paper, we focus on electromagnetic fault injection (EMFI) on the control flow, especially on the instruction cache. We target the very widespread (smartphones, tablets, settop-boxes, health-industry monitors and sensors, etc.) ARMv7-M architecture. We describe a practical EMFI platform and present a methodology providing high control level and high reproducibility over fault injections. Indeed, we observe that a precise fault model occurs in up to 96% of the cases. We then characterize and exhibit this practical fault model on the cache that is not yet considered in the literature. We comprehensively describe its effects and show how it can be used to reproduce well known fault attacks. Finally, we describe how it can benefits attackers to mount new powerful attacks or simplify existing ones.


workshop on fault diagnosis and tolerance in cryptography | 2014

Countermeasures against High-Order Fault-Injection Attacks on CRT-RSA

Pablo Rauzy; Sylvain Guilley

In this paper we study the existing CRT-RSA countermeasures against fault-injection attacks. In an attempt to classify them we get to achieve deep understanding of how they work. We show that the many countermeasures that we study (and their variations) actually share a number of common features, but optimize them in different ways. We also show that there is no conceptual distinction between test-based and infective countermeasures and how either one can be transformed into the other. Furthermore, we show that faults on the code (skipping instructions) can be captured by considering only faults on the data. These intermediate results allow us to improve the state of the art in several ways: (a) we fix an existing and that was known to be broken countermeasure (namely the one from Shamir), (b) we drastically optimize an existing countermeasure (namely the one from Vigilant) which we reduce to 3 tests instead of 9 in its original version, and prove that it resists not only one fault but also an arbitrary number of randomizing faults, (c) we also show how to upgrade countermeasures to resist any given number of faults: given a correct first-order countermeasure, we present a way to design a provable high-order countermeasure (for a well-defined and reasonable fault model). Finally, we pave the way for a generic approach against fault attacks for any modular arithmetic computations, and thus for the automatic insertion of countermeasures.


international conference information security theory and practice | 2011

Can code polymorphism limit information leakage

Antoine Amarilli; Sascha Müller; David Naccache; Daniel Page; Pablo Rauzy; Michael Tunstall

In addition to its usual complexity assumptions, cryptography silently assumes that information can be physically protected in a single location. As one can easily imagine, real-life devices are not ideal and information may leak through different physical side-channels. It is a known fact that information leakage is a function of both the executed code F and its input x. In this work we explore the use of polymorphic code as a way of resisting side channel attacks. We present experimental results with procedural and functional languages. In each case we rewrite the protected code code Fi before its execution. The outcome is a genealogy of programs F0, F1, . . . such that for all inputs x and for all indexes i ≠ j ⇒ Fi(x) = Fj(x) and Fi ne; Fj . This is shown to increase resistance to side channel attacks.


international workshop constructive side-channel analysis and secure design | 2016

Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT

Ágnes Kiss; Juliane Krämer; Pablo Rauzy; Jean-Pierre Seifert

In this work, we analyze all existing RSA-CRT countermeasures against the Bellcore attack that use binary self-secure exponentiation algorithms. We test their security against a powerful adversary by simulating fault injections in a fault model that includes random, zeroing, and skipping faults at all possible fault locations. We find that most of the countermeasures are vulnerable and do not provide sufficient security against all attacks in this fault model. After investigating how additional measures can be included to counter all possible fault injections, we present three countermeasures which prevent both power analysis and many kinds of fault attacks.


trustworthy global computing | 2012

From Rational Number Reconstruction to Set Reconciliation and File Synchronization

Antoine Amarilli; Fabrice Ben Hamouda; Florian Bourse; Robin Morisset; David Naccache; Pablo Rauzy

This work revisits set reconciliation, the problem of synchronizing two multisets of fixed-size values while minimizing transmission complexity. We propose a new number-theoretic reconciliation protocol called Divide and Factor D&F that achieves optimal asymptotic transmission complexity --- as do previously known alternative algorithms. We analyze the computational complexities of various D&F variants, study the problem of synchronizing sets of variable-size files using hash functions and apply D&F to synchronize file hierarchies taking file locations into account. We describe btrsync, our open-source D&F implementation, and benchmark it against the popular software rsync. It appears that btrsync transmits much less data than rsync, at the expense of a relatively modest computational overhead.


Journal of Cryptographic Engineering | 2014

A Formal Proof of Countermeasures against Fault Injection Attacks on CRT-RSA

Pablo Rauzy; Sylvain Guilley


IACR Cryptology ePrint Archive | 2013

Formally Proved Security of Assembly Code Against Leakage.

Pablo Rauzy; Sylvain Guilley; Zakaria Najm


arXiv: Cryptography and Security | 2014

Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack: A Pledge for Formal Methods in the Field of Implementation Security

Pablo Rauzy; Sylvain Guilley


IACR Cryptology ePrint Archive | 2015

A Generic Countermeasure Against Fault Injection Attacks on Asymmetric Cryptography.

Pablo Rauzy; Martin Moreau; Sylvain Guilley; Zakaria Najm


IACR Cryptology ePrint Archive | 2013

Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack

Pablo Rauzy; Sylvain Guilley

Collaboration


Dive into the Pablo Rauzy's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

David Naccache

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar

Zakaria Najm

Institut Mines-Télécom

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jean-Pierre Seifert

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Juliane Krämer

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Sascha Müller

Technische Universität Darmstadt

View shared research outputs
Researchain Logo
Decentralizing Knowledge