ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

PROOFS 2012 - Security Proofs for Embedded Systems

Date2012-09-13

Deadline2012-05-20

VenueLeuven, Belgium Belgium

Keywords

Websitehttps://www.proofs-workshop.org

Topics/Call fo Papers

The security of rmware (software or hardware) is challenged by a wealth of recent implementation-level exploits, that bypass security mechanisms.
(i) Side-channel attacks:
{ secret extraction,
{ high-value design recovery.
(ii) Perturbation attacks:
{ protocol alteration,
{ control fow modi cation,
{ type confusion,
{ critical instruction skipping,
{ TRNG forcing,
{ side-channel attacks enhanced by fault injection techniques,
{ attacks targeting the cryptographic modules (DFA, DBA, FSA, FIRE, safe-error attacks).
(iii) Invasive attacks:
{ malicious alteration of the control flow (e.g. Trojan insertion),
{ malicious alteration of the datapath (e.g. the bug attack on RSA),
{ design edition by means of FIB.

Last modified: 2012-05-05 18:36:11