Link-time smart card code hardening
- Author
- Ronald De Keulenaer, Jonas Maebe (UGent) , Koen De Bosschere (UGent) and Bjorn De Sutter (UGent)
- Organization
- Abstract
- This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of source code hardening, avoids the need for manual assembly writing, and is applicable in conjunction with closed third-party compilers. We implemented a range of cookbook code hardening recipes in a prototype link-time rewriter and evaluate their coverage and associated overhead to conclude that this approach is promising. We demonstrate that the overhead of using an automated link-time approach is not significantly higher than what can be obtained with compile-time hardening or with manual hardening of compiler-generated assembly code.
- Keywords
- SOFTWARE, DIVERSITY, Software protection, Binary rewriting, Smart card, Fault, Overhead
Downloads
-
link-time smart card code hardening.pdf
- full text
- |
- open access
- |
- |
- 569.57 KB
Citation
Please use this url to cite or link to this publication: http://hdl.handle.net/1854/LU-6958527
- MLA
- De Keulenaer, Ronald, et al. “Link-Time Smart Card Code Hardening.” INTERNATIONAL JOURNAL OF INFORMATION SECURITY, vol. 15, no. 2, Springer Berlin Heidelberg, 2016, pp. 111–30, doi:10.1007/s10207-015-0282-0.
- APA
- De Keulenaer, R., Maebe, J., De Bosschere, K., & De Sutter, B. (2016). Link-time smart card code hardening. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 15(2), 111–130. https://doi.org/10.1007/s10207-015-0282-0
- Chicago author-date
- De Keulenaer, Ronald, Jonas Maebe, Koen De Bosschere, and Bjorn De Sutter. 2016. “Link-Time Smart Card Code Hardening.” INTERNATIONAL JOURNAL OF INFORMATION SECURITY 15 (2): 111–30. https://doi.org/10.1007/s10207-015-0282-0.
- Chicago author-date (all authors)
- De Keulenaer, Ronald, Jonas Maebe, Koen De Bosschere, and Bjorn De Sutter. 2016. “Link-Time Smart Card Code Hardening.” INTERNATIONAL JOURNAL OF INFORMATION SECURITY 15 (2): 111–130. doi:10.1007/s10207-015-0282-0.
- Vancouver
- 1.De Keulenaer R, Maebe J, De Bosschere K, De Sutter B. Link-time smart card code hardening. INTERNATIONAL JOURNAL OF INFORMATION SECURITY. 2016;15(2):111–30.
- IEEE
- [1]R. De Keulenaer, J. Maebe, K. De Bosschere, and B. De Sutter, “Link-time smart card code hardening,” INTERNATIONAL JOURNAL OF INFORMATION SECURITY, vol. 15, no. 2, pp. 111–130, 2016.
@article{6958527, abstract = {{This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of source code hardening, avoids the need for manual assembly writing, and is applicable in conjunction with closed third-party compilers. We implemented a range of cookbook code hardening recipes in a prototype link-time rewriter and evaluate their coverage and associated overhead to conclude that this approach is promising. We demonstrate that the overhead of using an automated link-time approach is not significantly higher than what can be obtained with compile-time hardening or with manual hardening of compiler-generated assembly code.}}, author = {{De Keulenaer, Ronald and Maebe, Jonas and De Bosschere, Koen and De Sutter, Bjorn}}, issn = {{1615-5262}}, journal = {{INTERNATIONAL JOURNAL OF INFORMATION SECURITY}}, keywords = {{SOFTWARE,DIVERSITY,Software protection,Binary rewriting,Smart card,Fault,Overhead}}, language = {{eng}}, number = {{2}}, pages = {{111--130}}, publisher = {{Springer Berlin Heidelberg}}, title = {{Link-time smart card code hardening}}, url = {{http://doi.org/10.1007/s10207-015-0282-0}}, volume = {{15}}, year = {{2016}}, }
- Altmetric
- View in Altmetric
- Web of Science
- Times cited: