![](/assets/images/picto-drapeau-france-OnZXal1.png)
4. Coupled software and physical attacks
Today's systems-on-a-chip are increasingly complex. This complexity is leading to the development of new attack paths that combine hardware and software aspects. Thus, a physical attack can open a loophole enabling a software attack, or software code can lead to a hardware failure .
4.1 Coupling software and physical attacks
An example of coupled attacks targeting processors is the hardware corruption of a secured boot loader sequence, enabling the execution of malicious code. During a normal secured boot loader sequence, the boot code is loaded...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
![](/assets/images/logo-eti-KGYj7ZH.png)
The Ultimate Scientific and Technical Reference
This article is included in
Software technologies and System architectures
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Coupled software and physical attacks
Bibliography
Websites
Collection of examples of reverse engineering of integrated circuits:
French security solutions, France Cybersecurity label:
Events
Conference on Cryptographic Hardware and Embedded Systems (CHES) : https://ches.iacr.org/
IEEE International Symposium on hardware Oriented Security and Trust (HOST) : http://www.hostsymposium.org/
International Workshop on cryptographic...
Standards and norms
- Advanced Encryption Standard (AES), Federal Information Processing Standards Publication (FIPS) 197, nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf - FIPS197 - 2001
- ARM Security Technology. Building a secure system using trustzone technology. ARM Limited. - PRD29-GENC-009492C - 2005-2009
- Standard Test Access Port and Boundary – Scan Architecture. - IEEE 1149.1 - 2013
Directory
Manufacturers – Suppliers – Distributors (non-exhaustive list)
Rambus holds numerous patents on auxiliary channel attacks (formerly Cryptography Research): https://www.rambus.com/security/
French ITSEFs approved for the evaluation of embedded electronic systems:
Serma Safety...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
![](/assets/images/logo-eti-KGYj7ZH.png)
The Ultimate Scientific and Technical Reference