About us
Espace utilisateur
Education
INSTN offers more than 40 diplomas from operator level to post-graduate degree level. 30% of our students are international students.
Professionnal development
Professionnal development
Find a training course
INSTN delivers off-the-self or tailor-made training courses to support the operational excellence of your talents.
Human capital solutions
At INSTN, we are committed to providing our partners with the best human capital solutions to develop and deliver safe & sustainable projects.
Thesis
Home   /   Thesis   /   Attacker model validation for laser-based attacks on integrated circuits

Attacker model validation for laser-based attacks on integrated circuits

Cyber security : hardware and sofware Electronics and microelectronics - Optoelectronics Engineering sciences Technological challenges

Abstract

The security of embedded systems is nowadays a fundamental issue in many domains: IoT, Automotive, Aeronautics, among others. The physical attacks are a specific threat assuming a physical access to the target. In particular, fault injection attacks on the integrated circuits (IC) allows to disturb the system in order to retrieve secret material or to achieve a special goal such as by passing secure boot to execute malicious code. Due to their powerful capacities to defeat system security, developers must protect their system against such attack to be compliant with security standards such as Common Criteria and FIPS.

Within the context of continuous downscaling of silicon technologies, and with the transition to FD-SOI technologies, the vulnerability model of an IC must be drastically revised, from the transistor level up to the complex digital circuits one. In this PhD we propose to study the attacker model validation in the at the latter level. The objective is to contribute to the definition of a model of vulnerability after synthesis-of a RTL description of a circuit (for example a core processor) in a 22 nm FD-SOI technology. These models will contribute to define the attacker model injected as input in formal-based verification tools. The candidate will have to define a methodology to characterize with laser experiments the multilayer and heterogenous models in order to provide a quantitative analysis of their limit of validity. The methodology will be tested on ASIC realized by CEA for R&D projects allowing having a full control and knowledge of the architecture, of the design and synthesis parameters and the executed codes.

Laboratory

Département Systèmes (LETI)
Service Sécurité des Systèmes Electroniques et des Composants
Laboratoire de Sécurité des COmposants
Université de Lyon
Top envelopegraduation-hatlicensebookuserusersmap-markercalendar-fullbubblecrossmenuarrow-down