PROOFS 2012 - Security Proofs for Embedded Systems
Topics/Call fo Papers
The security of rmware (software or hardware) is challenged by a wealth of recent implementation-level exploits, that bypass security mechanisms.
(i) Side-channel attacks:
{ secret extraction,
{ high-value design recovery.
(ii) Perturbation attacks:
{ protocol alteration,
{ control fow modication,
{ type confusion,
{ critical instruction skipping,
{ TRNG forcing,
{ side-channel attacks enhanced by fault injection techniques,
{ attacks targeting the cryptographic modules (DFA, DBA, FSA, FIRE, safe-error attacks).
(iii) Invasive attacks:
{ malicious alteration of the control flow (e.g. Trojan insertion),
{ malicious alteration of the datapath (e.g. the bug attack on RSA),
{ design edition by means of FIB.
(i) Side-channel attacks:
{ secret extraction,
{ high-value design recovery.
(ii) Perturbation attacks:
{ protocol alteration,
{ control fow modication,
{ type confusion,
{ critical instruction skipping,
{ TRNG forcing,
{ side-channel attacks enhanced by fault injection techniques,
{ attacks targeting the cryptographic modules (DFA, DBA, FSA, FIRE, safe-error attacks).
(iii) Invasive attacks:
{ malicious alteration of the control flow (e.g. Trojan insertion),
{ malicious alteration of the datapath (e.g. the bug attack on RSA),
{ design edition by means of FIB.
Other CFPs
- 3rd International Workshop on Software Knowledge - SKY 2012
- 3rd International Workshop on Semantic Sensor Web - SSW 2012
- 6th International Workshop on Information Filtering and Retrieval: novel distributed systems and applications
- 5th Szeged International Workshop on Advances in Nanoscience
- 5th International Conference of Education Research and Innovation
Last modified: 2012-05-05 18:36:11