2,993 research outputs found

    Formal verification of a software countermeasure against instruction skip attacks

    Get PDF
    Fault attacks against embedded circuits enabled to define many new attack paths against secure circuits. Every attack path relies on a specific fault model which defines the type of faults that the attacker can perform. On embedded processors, a fault model consisting in an assembly instruction skip can be very useful for an attacker and has been obtained by using several fault injection means. To avoid this threat, some countermeasure schemes which rely on temporal redundancy have been proposed. Nevertheless, double fault injection in a long enough time interval is practical and can bypass those countermeasure schemes. Some fine-grained countermeasure schemes have also been proposed for specific instructions. However, to the best of our knowledge, no approach that enables to secure a generic assembly program in order to make it fault-tolerant to instruction skip attacks has been formally proven yet. In this paper, we provide a fault-tolerant replacement sequence for almost all the instructions of the Thumb-2 instruction set and provide a formal verification for this fault tolerance. This simple transformation enables to add a reasonably good security level to an embedded program and makes practical fault injection attacks much harder to achieve

    Simulation based estimation of branching models for LTR retrotransposons

    Full text link
    Motivation: LTR retrotransposons are mobile elements that are able, like retroviruses, to copy and move inside eukaryotic genomes. In the present work, we propose a branching model for studying the propagation of LTR retrotransposons in these genomes. This model allows to take into account both positions and degradations of LTR retrotransposons copies. In our model, the duplication rate is also allowed to vary with the degradation level. Results: Various functions have been implemented in order to simulate their spread and visualization tools are proposed. Based on these simulation tools, we show that an accurate estimation of the parameters of this propagation model can be performed. We applied this method to the study of the spread of the transposable elements ROO, GYPSY, and DM412 on a chromosome of \textit{Drosophila melanogaster}. Availability: Our proposal has been implemented using Python software. Source code is freely available on the web at https://github.com/SergeMOULIN/retrotransposons-spread.Comment: 7 pages, 3 figures, 7 tables. Submit to "Bioiformatics" on March 1, 201

    Experimental evaluation of two software countermeasures against fault attacks

    Get PDF
    Injection of transient faults can be used as a way to attack embedded systems. On embedded processors such as microcontrollers, several studies showed that such a transient fault injection with glitches or electromagnetic pulses could corrupt either the data loads from the memory or the assembly instructions executed by the circuit. Some countermeasure schemes which rely on temporal redundancy have been proposed to handle this issue. Among them, several schemes add this redundancy at assembly instruction level. In this paper, we perform a practical evaluation for two of those countermeasure schemes by using a pulsed electromagnetic fault injection process on a 32-bit microcontroller. We provide some necessary conditions for an efficient implementation of those countermeasure schemes in practice. We also evaluate their efficiency and highlight their limitations. To the best of our knowledge, no experimental evaluation of the security of such instruction-level countermeasure schemes has been published yet.Comment: 6 pages, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Arlington : United States (2014

    La difficile articulation entre les espaces du quotidien chez les enfants sans logement

    Get PDF
    International audienceDe plus en plus d'enfants vivent avec leurs parents dans des structures d'hébergement collectif ou des hôtels sociaux, à défaut de pouvoir se loger. Ces familles pauvres font ainsi l'expérience d'un système où règne le provisoire, et qui se traduit en particulier par une forte instabilité résidentielle. À partir notamment d'une enquête sur un échantillon aléatoire de 232 enfants âgés de six à douze ans révolus, c'est-à-dire en âge d'être scolarisés en primaire, cet article montre que cet épisode sans domicile limite les pratiques et les relations sociales des enfants dans différents espaces du quotidien : le lieu d'hébergement, le quartier de résidence ou les environs de l'école

    Numerical study of an optimization problem for mosaic active imaging

    Get PDF
    5International audienceIn this paper, we focus on the restoration of an image in mosaic active imaging. This emerging imaging technique consists in acquiring a mosaic of images (laser shots) by focusing a laser beam on a small portion of the target object and subsequently moving it to scan the whole field of view. To restore the whole image from such a mosaic, a prior work proposed a simplified forward model describing the acquisition process. It also provides a prior on the acquisition parameters. Together with a prior on the distribution of images, this leads to a MAP estimate alternating between the estimation of the restored image and the estimation of these parameters. The novelty of the current paper is twofold: (i) We provide a numerical study and argue that faster convergence can be achieved for estimating the acquisition parameters; (ii) we show that the results from this earlier work are improved when the laser shots are acquired according to a more compact pattern

    Bayesian image restoration for mosaic active imaging

    Get PDF
    International audienceIn this paper, we focus on the restoration of images acquired with a new active imaging concept. This new instrument generates a mosaic of active imaging acquisitions. We first describe a simplified forward model of this so-called ''mosaic active imaging''. We also assume a prior on the distribution of images, using the \ac{TV}, and deduce a restoration algorithm. This algorithm iterates one step for the estimation of the restored image and one step for the estimation of the acquisition parameters. We then provide the details useful to the implementation of these two steps. In particular, we show that the image estimation can be performed with graph-cuts. This allows a fast resolution of this image estimation step. Finally, we detail numerical experiments showing that acquisitions made with a mosaic active imaging device can be restored even under severe noise levels, with few acquisitions

    Proof of concept for microarray-based detection of DNA-binding oncogenes in cell extracts

    Get PDF
    The function of DNA-binding proteins is controlled not just by their abundance, but mainly at the level of their activity in terms of their interactions with DNA and protein targets. Moreover, the affinity of such transcription factors to their target sequences is often controlled by co-factors and/or modifications that are not easily assessed from biological samples. Here, we describe a scalable method for monitoring protein-DNA interactions on a microarray surface. This approach was designed to determine the DNA-binding activity of proteins in crude cell extracts, complementing conventional expression profiling arrays. Enzymatic labeling of DNA enables direct normalization of the protein binding to the microarray, allowing the estimation of relative binding affinities. Using DNA sequences covering a range of affinities, we show that the new microarray-based method yields binding strength estimates similar to low-throughput gel mobility-shift assays. The microarray is also of high sensitivity, as it allows the detection of a rare DNA-binding protein from breast cancer cells, the human tumor suppressor AP-2. This approach thus mediates precise and robust assessment of the activity of DNA-binding proteins and takes present DNA-binding assays to a high throughput leve

    Fault attacks on two software countermeasures

    Get PDF
    Short version of the article "Experimental evaluation of two software countermeasures against fault attacks" presented at the 2014 IEEE Symposium on Hardware-Oriented Security and Trust (HOST) in May 2014.International audienceInjection of transient faults can be used as a way to attack embedded systems. On embedded processors such as microcontrollers, several studies showed that such a transient fault injection could corrupt either the data loads from the memory or the assembly instructions executed by the circuit. Some countermeasure schemes which rely on temporal redundancy have been proposed to handle this issue. Among them, several schemes add this redundancy at assembly instruction level. In this paper, we perform a practical evaluation for two of those countermeasure schemes by using a pulsed electromagnetic fault injection process on a 32-bit microcontroller
    • …
    corecore