Thierno Barry via llvm-dev
2016-Aug-30 09:04 UTC
[llvm-dev] Publication of an llvm-based tool that protects against fault injection attacks
Hello, My team and I have recently published an LLVM-based tool at “Cryptography and Security in Computing Systems 2016” (CS2), and we would like to add it on the list of LLVM related publications. The goal of our tool is to automatically protect the code being compiled against fault injection attacks *Title:* Compilation of a Countermeasure Against Instruction-Skip Fault Attacks Available at the ACM Digital Library: http://dl.acm.org/citation.cfm?id=2858931 And also here: http://thiernobarry.fr/publications/preprint/T-Barry.pdf Abstract: ======= Physical attacks especially fault attacks represent one of the major threats against embedded systems. In the state of the art, software countermeasures against fault attacks are either applied at the source code level where it will very likely be removed at compilation time, or at assembly level where several transformations need to be performed on the assembly code and lead to significant overheads both in terms of code size and execution time. This paper presents the use of compiler techniques to efficiently automate the application of software countermeasures against instruction-skip fault attacks. We propose a modified LLVM compiler that considers our security objectives throughout the compilation process. Experimental results illustrate the effectiveness of this approach on AES implementations running on an ARM-based microcontroller in terms of security overhead compared to existing solutions. Regards -- Thierno Barry PhD student at The French Atomic Energy Commission (CEA) Grenoble, France http://thiernobarry.fr
Renato Golin via llvm-dev
2016-Sep-01 17:34 UTC
[llvm-dev] Publication of an llvm-based tool that protects against fault injection attacks
Done, http://llvm.org/pubs/ cheers, --renato On 30 August 2016 at 10:04, Thierno Barry via llvm-dev <llvm-dev at lists.llvm.org> wrote:> Hello, > > My team and I have recently published an LLVM-based tool at “Cryptography > and Security > in Computing Systems 2016” (CS2), and we would like to add it on the list of > LLVM related publications. > The goal of our tool is to automatically protect the code being compiled > against fault injection attacks > > *Title:* Compilation of a Countermeasure Against Instruction-Skip Fault > Attacks > Available at the ACM Digital Library: > http://dl.acm.org/citation.cfm?id=2858931 > And also here: http://thiernobarry.fr/publications/preprint/T-Barry.pdf > > Abstract: > =======> > Physical attacks especially fault attacks represent one of the major threats > against embedded systems. In the state of the art, software countermeasures > against fault attacks are either applied at the source code level where it > will very likely be removed at compilation time, or at assembly level where > several transformations need to be performed on the assembly code and lead > to significant overheads both in terms of code size and execution time. This > paper presents the use of compiler techniques to efficiently automate the > application of software countermeasures against instruction-skip fault > attacks. We propose a modified LLVM compiler that considers our security > objectives throughout the compilation process. Experimental results > illustrate the effectiveness of this approach on AES implementations running > on an ARM-based microcontroller in terms of security overhead compared to > existing solutions. > > Regards > > -- > Thierno Barry > PhD student at The French Atomic Energy Commission (CEA) > Grenoble, France > http://thiernobarry.fr > _______________________________________________ > LLVM Developers mailing list > llvm-dev at lists.llvm.org > http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-dev
Renato Golin via llvm-dev
2016-Sep-02 11:09 UTC
[llvm-dev] Publication of an llvm-based tool that protects against fault injection attacks
On 2 September 2016 at 11:45, BARRY Thierno 241290 <Thierno.BARRY at cea.fr> wrote:> However, would it be possible to replace the current link (that points to my personal web page), by the official ACM link: https://dl.acm.org/citation.cfm?doid=2858930.2858931 ? I apologize in advance for this back and forth.Hi, Well, that's a link to a paywall, and it wouldn't be fair to publish a link asking people to buy it, when there's a free version available. We do seem to have other links to ACM, so it wouldn't be a first... Are you concerned with bandwidth? Or just reference? --renato
David Chisnall via llvm-dev
2016-Sep-02 11:59 UTC
[llvm-dev] Publication of an llvm-based tool that protects against fault injection attacks
On 2 Sep 2016, at 12:09, Renato Golin via llvm-dev <llvm-dev at lists.llvm.org> wrote:> > On 2 September 2016 at 11:45, BARRY Thierno 241290 <Thierno.BARRY at cea.fr> wrote: >> However, would it be possible to replace the current link (that points to my personal web page), by the official ACM link: https://dl.acm.org/citation.cfm?doid=2858930.2858931 ? I apologize in advance for this back and forth. > > Hi, > > Well, that's a link to a paywall, and it wouldn't be fair to publish a > link asking people to buy it, when there's a free version available. > > We do seem to have other links to ACM, so it wouldn't be a first... > Are you concerned with bandwidth? Or just reference?If it’s an ACM DL link, then it has the nice feature of counting downloads in a place that’s useful for aggregate bibliometrics. It’s also the canonical version. ACM has an ‘authorizer’ service that allows people to put links to publications on their personal sites that check the referrer and allow people past the paywall for a single article. They might be willing to extend this for things like the LLVM publications page. I can ask, if there’s some general interest in supporting this. David -------------- next part -------------- A non-text attachment was scrubbed... Name: smime.p7s Type: application/pkcs7-signature Size: 3719 bytes Desc: not available URL: <http://lists.llvm.org/pipermail/llvm-dev/attachments/20160902/a2553b13/attachment.bin>
Apparently Analagous Threads
- Publication - Devirtualization in LLVM
- Failed to create BUILTIN\Guests group NT_STATUS_ACCESS_DENIED! Can Winbind allocate gids?
- Failed to create BUILTIN\Guests group NT_STATUS_ACCESS_DENIED! Can Winbind allocate gids?
- security implications of caching with virtio pmem (was Re: [PATCH v3 0/5] kvm "virtio pmem" device)
- [GSoC 2016] Capture Tracking Improvements - Background Information