Skip to main content

CLAM (Cross-Layer Fault Analysis for Microprocessor Architectures)

EPST

Equipe-Action Labex Persyval

This project is part of the axis Cyber Physical System (CPS) of the labex. It aims at improving the security and the safety of Cyber Physical System (CPS).
Securing the software components (e.g., microprocessors and microcontrollers) intended for the IoT market, as well as for critical Cyber Physical Systems, requires, on the one hand, analyzing their vulnerabilities and, on the other hand, defining hardware and software countermeasures at the most appropriate cost. The increasing complexity of the microprocessor architectures and the applications they run means that the typical software fault models (such as instruction skips, instruction replacements) used to analyze the vulnerability of their code are no longer sufficient to express the diversity of faulty behaviors in modern architectures. Indeed, microarchitecture designers have progressively added many complex hardware blocks (for example, pipeline, cache memory, branch prediction, speculative execution, specialized blocks) in order to optimize program executions. At the same time, fault injection techniques (such as ElectroMagnetic or Laser attacks, voltage or clock glitch injections) are constantly progressing. Today, these techniques allow multiple injections both multi-temporal and multi-spatial to achieve attacker objectives
Link : https://cybersecurity.univ-grenoble-alpes.fr//the-institute/focus-on/focus-on-project-clam-cross-layer-fault-analysis-for-microprocessor-architectures-846603.kjsp?RH=1560346506551

Informations

  • Funding: Equipe-Action Labex Persyval, 200 k€
  • Project started on September 2020
  • Duration: 3 years
  • Project leader: Paolo MAISTRI
  • Project members:
    • LCIS (Valence, France)
    • TIMA (Grenoble, France)
    • Verimag (Grenoble, France)

Submitted on March 21, 2023

Updated on March 21, 2023