Skip to main content

Showing 1–3 of 3 results for author: Schrammel, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2301.13760  [pdf, other

    cs.CR

    EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks

    Authors: Pascal Nasahl, Salmin Sultana, Hans Liljestrand, Karanvir Grewal, Michael LeMay, David M. Durham, David Schrammel, Stefan Mangard

    Abstract: Fault attacks enable adversaries to manipulate the control-flow of security-critical applications. By inducing targeted faults into the CPU, the software's call graph can be escaped and the control-flow can be redirected to arbitrary functions inside the program. To protect the control-flow from these attacks, dedicated fault control-flow integrity (CFI) countermeasures are commonly deployed. Howe… ▽ More

    Submitted 24 March, 2023; v1 submitted 31 January, 2023; originally announced January 2023.

    Comments: Accepted at HOST'23

  2. arXiv:2208.01356  [pdf, other

    cs.CR

    SCFI: State Machine Control-Flow Hardening Against Fault Attacks

    Authors: Pascal Nasahl, Martin Unterguggenberger, Rishub Nagpal, Robert Schilling, David Schrammel, Stefan Mangard

    Abstract: Fault injection (FI) is a powerful attack methodology allowing an adversary to entirely break the security of a target device. As finite-state machines (FSMs) are fundamental hardware building blocks responsible for controlling systems, inducing faults into these controllers enables an adversary to hijack the execution of the integrated circuit. A common defense strategy mitigating these attacks i… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

  3. arXiv:2105.03395  [pdf, other

    cs.CR

    SERVAS! Secure Enclaves via RISC-V Authenticryption Shield

    Authors: Stefan Steinegger, David Schrammel, Samuel Weiser, Pascal Nasahl, Stefan Mangard

    Abstract: Isolation is a long-standing challenge of software security. Traditional privilege rings and virtual memory are more and more augmented with concepts such as capabilities, protection keys, and powerful enclaves. At the same time, we are evidencing an increased need for physical protection, shifting towards full memory encryption schemes. This results in a complex interplay of various security mech… ▽ More

    Submitted 7 May, 2021; originally announced May 2021.