Ghent University Academic Bibliography

Advanced

Link-time smart card code hardening

Ronald De Keulenaer UGent, Jonas Maebe, Koen De Bosschere UGent and Bjorn De Sutter UGent (2016) INTERNATIONAL JOURNAL OF INFORMATION SECURITY. 15(2). p.111-130
abstract
This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of source code hardening, avoids the need for manual assembly writing, and is applicable in conjunction with closed third-party compilers. We implemented a range of cookbook code hardening recipes in a prototype link-time rewriter and evaluate their coverage and associated overhead to conclude that this approach is promising. We demonstrate that the overhead of using an automated link-time approach is not significantly higher than what can be obtained with compile-time hardening or with manual hardening of compiler-generated assembly code.
Please use this url to cite or link to this publication:
author
organization
year
type
journalArticle (original)
publication status
published
subject
keyword
SOFTWARE, DIVERSITY, Software protection, Binary rewriting, Smart card, Fault, Overhead
journal title
INTERNATIONAL JOURNAL OF INFORMATION SECURITY
Int. J. Inf. Secur.
volume
15
issue
2
pages
111 - 130
publisher
Springer Berlin Heidelberg
Web of Science type
Article
Web of Science id
000372262800001
JCR category
COMPUTER SCIENCE, SOFTWARE ENGINEERING
JCR impact factor
1.915 (2016)
JCR rank
32/106 (2016)
JCR quartile
2 (2016)
ISSN
1615-5262
DOI
10.1007/s10207-015-0282-0
language
English
UGent publication?
yes
classification
A1
copyright statement
I have transferred the copyright for this publication to the publisher
id
6958527
handle
http://hdl.handle.net/1854/LU-6958527
alternative location
http://users.elis.ugent.be/~brdsutte/research/publications/2015IJISdekeulenaer.pdf
date created
2015-10-12 16:06:19
date last changed
2016-12-19 15:45:29
@article{6958527,
  abstract     = {This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of source code hardening, avoids the need for manual assembly writing, and is applicable in conjunction with closed third-party compilers. We implemented a range of cookbook code hardening recipes in a prototype link-time rewriter and evaluate their coverage and associated overhead to conclude that this approach is promising. We demonstrate that the overhead of using an automated link-time approach is not significantly higher than what can be obtained with compile-time hardening or with manual hardening of compiler-generated assembly code.},
  author       = {De Keulenaer, Ronald and Maebe, Jonas and De Bosschere, Koen and De Sutter, Bjorn},
  issn         = {1615-5262},
  journal      = {INTERNATIONAL JOURNAL OF INFORMATION SECURITY},
  keyword      = {SOFTWARE,DIVERSITY,Software protection,Binary rewriting,Smart card,Fault,Overhead},
  language     = {eng},
  number       = {2},
  pages        = {111--130},
  publisher    = {Springer Berlin Heidelberg},
  title        = {Link-time smart card code hardening},
  url          = {http://dx.doi.org/10.1007/s10207-015-0282-0},
  volume       = {15},
  year         = {2016},
}

Chicago
De Keulenaer, Ronald, Jonas Maebe, Koen De Bosschere, and Bjorn De Sutter. 2016. “Link-time Smart Card Code Hardening.” International Journal of Information Security 15 (2): 111–130.
APA
De Keulenaer, R., Maebe, J., De Bosschere, K., & De Sutter, B. (2016). Link-time smart card code hardening. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 15(2), 111–130.
Vancouver
1.
De Keulenaer R, Maebe J, De Bosschere K, De Sutter B. Link-time smart card code hardening. INTERNATIONAL JOURNAL OF INFORMATION SECURITY. Springer Berlin Heidelberg; 2016;15(2):111–30.
MLA
De Keulenaer, Ronald, Jonas Maebe, Koen De Bosschere, et al. “Link-time Smart Card Code Hardening.” INTERNATIONAL JOURNAL OF INFORMATION SECURITY 15.2 (2016): 111–130. Print.