Skip to Main content Skip to Navigation
Book sections

Fault Analysis Assisted by Simulation

Abstract : Side-channel and fault injection attacks are renown techniques to extract keys from cryptographic devices. Fortunately, leakage reduction and fault detection countermeasures exist and can be implemented right in the source-code. However, source-code level countermeasures might be altered during the compilation process. Design simulation is an effective means to detect such harmful simplifications. This is a well-known methodology to analyze regressions in terms of side-channel leakage. In this chapter, we explain that protections against fault injection attacks are no exception. First of all, we show that vulnerabilities to those attacks can be easily detected by simulation methods. Second, we highlight that simulation techniques are also highly efficient in detecting logic simplifications which destroy (fully or partly) the countermeasures. Thus, the simulation-based methodology we present in this chapter shows that it is possible to decide quickly which compilation options are safe and which ones are detrimental to the security.
Document type :
Book sections
Complete list of metadatas

Cited literature [24 references]  Display  Hide  Download
Contributor : Sylvain Guilley <>
Submitted on : Wednesday, August 19, 2020 - 12:44:09 AM
Last modification on : Wednesday, October 14, 2020 - 4:14:39 AM
Long-term archiving on: : Monday, November 30, 2020 - 8:10:30 PM


Files produced by the author(s)




Kais Chibani, Adrien Facon, Sylvain Guilley, Damien Marion, Yves Mathieu, et al.. Fault Analysis Assisted by Simulation. Jakub Breier; Xiaolu Hou; Shivam Bhasin. Automated Methods in Cryptographic Fault Analysis, Springer International Publishing, pp.263-277, 2019, 978-3-030-11332-2. ⟨10.1007/978-3-030-11333-9_12⟩. ⟨hal-02915671⟩



Record views


Files downloads