Skip to content

Commit

Permalink
deploy: 248bd20
Browse files Browse the repository at this point in the history
  • Loading branch information
kbeyls committed Jul 16, 2024
1 parent de1393f commit 9cdf9c4
Show file tree
Hide file tree
Showing 11 changed files with 96 additions and 94 deletions.
Binary file modified LLSoftSecBook.epub
Binary file not shown.
13 changes: 7 additions & 6 deletions LLSoftSecBook.html
Original file line number Diff line number Diff line change
Expand Up @@ -445,7 +445,7 @@ <h1 class="title">Low-Level Software Security for Compiler
Copyright 2023 Lucian Popescu <a href="mailto:[email protected]" class="email">[email protected]</a><br />
Copyright 2024 Anders Waldenborg <a href="mailto:[email protected]" class="email">[email protected]</a><br />
</p>
<p>Version: 0-194-g05b0c3d</p>
<p>Version: 0-196-g248bd20</p>
</header>

<main id="content">
Expand Down Expand Up @@ -2992,9 +2992,10 @@ <h3 data-number="7.3.1" id="common-forms-of-fault-injection-attacks"><span class
instruction execution level are often referred to as fault models, where
one can say that a specific fault injection behaves as an instruction
skip, etc. More details about the concept of fault models can be found
in the paper “Fault Attacks on Secure Embedded Software: Threats, Design
and Evaluation” (https://arxiv.org/pdf/2003.10513.pdf), where a good
illustration of the concept is shown in figure 1 of that paper.</p>
in the paper <a href="https://arxiv.org/pdf/2003.10513.pdf">“Fault
Attacks on Secure Embedded Software: Threats, Design and
Evaluation”</a>, where a good illustration of the concept is shown in
figure 1 of that paper.</p>
<span class="todo_ref" href="#todo_31"><sup>todo</sup></span>
<span id="todo_31" class="todo">Make the above reference to a paper use
bibtex. <a href="https://github.com/llsoftsec/llsoftsecbook/issues/159"><img src="data:image/svg+xml;charset=utf-8;base64,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" alt="#159" /></a></span>
Expand All @@ -3011,8 +3012,8 @@ <h3 data-number="7.3.1" id="common-forms-of-fault-injection-attacks"><span class
E.g. When writing a crypto key to a crypto accelerator, forcing the key
value written to be zero (caused to low voltage on bus hardware).</li>
</ul>
<p>Example: Attack on TrustZone for Armv8-M:
https://www.youtube.com/watch?v=4u6BAH8mEDw</p>
<p>Example: <a href="https://www.youtube.com/watch?v=4u6BAH8mEDw">Attack
on TrustZone for Armv8-M</a></p>
<p>There are other forms of physical attacks, but most of them requires
significant effort or cost (e.g. cut open the chip package can carry out
fault injection or readout secret data on chip).</p>
Expand Down
Binary file modified LLSoftSecBook.pdf
Binary file not shown.
Binary file modified book.epub
Binary file not shown.
48 changes: 24 additions & 24 deletions book.fdb_latexmk
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@
# Fdb version 3
["makeindex build/book.idx"] 1721071859 "build/book.idx" "build/book.ind" "build/book" 1721071861
"build/book.idx" 1721071861 6905 6948573501fb3266118c131ad6ad7200 "pdflatex"
["makeindex build/book.idx"] 1721140609 "build/book.idx" "build/book.ind" "build/book" 1721140611
"build/book.idx" 1721140610 6905 6948573501fb3266118c131ad6ad7200 "pdflatex"
(generated)
"build/book.ind"
"build/book.ilg"
["pdflatex"] 1721071859 "build/book.tex" "build/book.pdf" "book" 1721071861
"build/book.ind"
["pdflatex"] 1721140609 "build/book.tex" "build/book.pdf" "book" 1721140611
"/texlive/2020/texmf-dist/fonts/enc/dvips/lm/lm-ec.enc" 1254269338 2375 baa924870cfb487815765f9094cf3728 ""
"/texlive/2020/texmf-dist/fonts/enc/dvips/lm/lm-mathit.enc" 1202520719 2405 5dcf2c1b967ee25cc46c58cd52244aed ""
"/texlive/2020/texmf-dist/fonts/enc/dvips/lm/lm-mathsy.enc" 1202520719 2840 216e6e45ad352e2456e1149f28885bee ""
Expand Down Expand Up @@ -253,27 +253,27 @@
"/texlive/2020/texmf-dist/tex/latex/zref/zref-abspage.sty" 1602274933 2275 d29aca6fd67823551cb07584e3681d5d ""
"/texlive/2020/texmf-dist/tex/latex/zref/zref-base.sty" 1602274933 20688 beaddf14d96104d4bf016523be5395c5 ""
"/texlive/2020/texmf-dist/web2c/texmf.cnf" 1598393674 39451 15a3ebee027466ecb89701aa91dfebaf ""
"/texlive/2020/texmf-var/fonts/map/pdftex/updmap/pdftex.map" 1721071831 76767 e5334b482f98da831c7c1bc5febb3697 ""
"/texlive/2020/texmf-var/web2c/pdftex/pdflatex.fmt" 1721071785 1331090 1cc7f8d46fd17e39ae044be1b967d043 ""
"/texlive/2020/texmf.cnf" 1721071754 455 5b996dcaa0eb4ef14a83b026bc0a008c ""
"build/book.aux" 1721071861 53015 a3a6db0b1959841a4424c13c1cf908ee "pdflatex"
"build/book.ind" 1721071859 6317 8731b63f10e475f3645f999196fd7d3a "makeindex build/book.idx"
"build/book.tex" 1721071856 198307 494136a009a539fbda011264209c078b ""
"build/book.toc" 1721071861 7410 61c62b42bdae985aacf2ce28e2255d50 "pdflatex"
"img/CacheIndexing.pdf" 1721071855 18568 ae591a5d25922959873176bb391a1a3e ""
"img/CacheLevels.pdf" 1721071855 7331 afe09a9871b9e6e6258b9c2a1a9cbe7d ""
"img/jop.pdf" 1721071855 69723 d611595b1560545d73c0b4e5ed449a04 ""
"img/non-control-data-attack.pdf" 1721071855 27797 849d7f07901f8e98370d0202d44bea17 ""
"img/physical_attacks.pdf" 1721071855 10939 0a6d482967ea0da4cbab0e63b2045fb4 ""
"img/rop-call-stack.pdf" 1721071855 44878 5edd644d56fa949a46bb916ba7fa9a79 ""
"img/rop-control-flow.pdf" 1721071855 49873 718ce9b2bff986d209c7991379246166 ""
"img/side_channel_leakage_figure_1_branch.pdf" 1721071855 10694 09d9e393194760d575793a5430eb307f ""
"img/side_channel_leakage_figure_2_duration.pdf" 1721071855 11105 8ccb09fe9290558df762327dd7eedac8 ""
"img/side_channel_leakage_figure_3_toggle.pdf" 1721071855 11296 33d3047715915084cd45a5625a36b652 ""
"img/stack-buffer-overflow.pdf" 1721071855 31655 9664426a60872f749e0359c024478882 ""
"/texlive/2020/texmf-var/fonts/map/pdftex/updmap/pdftex.map" 1721140586 76767 e5334b482f98da831c7c1bc5febb3697 ""
"/texlive/2020/texmf-var/web2c/pdftex/pdflatex.fmt" 1721140556 1331092 d5829b54f461fcc5f46a80a29ceee648 ""
"/texlive/2020/texmf.cnf" 1721140533 455 5b996dcaa0eb4ef14a83b026bc0a008c ""
"build/book.aux" 1721140610 53015 a3a6db0b1959841a4424c13c1cf908ee "pdflatex"
"build/book.ind" 1721140609 6317 8731b63f10e475f3645f999196fd7d3a "makeindex build/book.idx"
"build/book.tex" 1721140605 198320 ef89e47eb6bdff687564844df00a7a87 ""
"build/book.toc" 1721140610 7410 61c62b42bdae985aacf2ce28e2255d50 "pdflatex"
"img/CacheIndexing.pdf" 1721140604 18568 8405116dc5ea396077668bac848028c3 ""
"img/CacheLevels.pdf" 1721140604 7330 cfc15372d2941816bd92afca23e8056d ""
"img/jop.pdf" 1721140604 69723 a245826d3fe9f3be09082ddcb07a0499 ""
"img/non-control-data-attack.pdf" 1721140604 27798 7033e15d5bac39aac533b0c2ba6b0394 ""
"img/physical_attacks.pdf" 1721140604 10939 cc92a45513e90c10391fcc4ae19a3f53 ""
"img/rop-call-stack.pdf" 1721140604 44878 f2a45aaa2d00670eb6a66d7da2d7b2f1 ""
"img/rop-control-flow.pdf" 1721140604 49873 5f1e113a25af644f1077a09846e44d69 ""
"img/side_channel_leakage_figure_1_branch.pdf" 1721140604 10693 9e6085e41571df881252fd17ca6d8d64 ""
"img/side_channel_leakage_figure_2_duration.pdf" 1721140604 11105 3679597e01c825088efd8a05d411e617 ""
"img/side_channel_leakage_figure_3_toggle.pdf" 1721140604 11296 edcf0a6a53b46de87da9445000eb26ef ""
"img/stack-buffer-overflow.pdf" 1721140604 31655 21b8b27c630d778ea260a5b2b1500589 ""
(generated)
"build/book.aux"
"build/book.log"
"build/book.pdf"
"build/book.toc"
"build/book.idx"
"build/book.toc"
"build/book.pdf"
13 changes: 7 additions & 6 deletions book.html
Original file line number Diff line number Diff line change
Expand Up @@ -445,7 +445,7 @@ <h1 class="title">Low-Level Software Security for Compiler
Copyright 2023 Lucian Popescu <a href="mailto:[email protected]" class="email">[email protected]</a><br />
Copyright 2024 Anders Waldenborg <a href="mailto:[email protected]" class="email">[email protected]</a><br />
</p>
<p>Version: 0-194-g05b0c3d</p>
<p>Version: 0-196-g248bd20</p>
</header>

<main id="content">
Expand Down Expand Up @@ -2992,9 +2992,10 @@ <h3 data-number="7.3.1" id="common-forms-of-fault-injection-attacks"><span class
instruction execution level are often referred to as fault models, where
one can say that a specific fault injection behaves as an instruction
skip, etc. More details about the concept of fault models can be found
in the paper “Fault Attacks on Secure Embedded Software: Threats, Design
and Evaluation” (https://arxiv.org/pdf/2003.10513.pdf), where a good
illustration of the concept is shown in figure 1 of that paper.</p>
in the paper <a href="https://arxiv.org/pdf/2003.10513.pdf">“Fault
Attacks on Secure Embedded Software: Threats, Design and
Evaluation”</a>, where a good illustration of the concept is shown in
figure 1 of that paper.</p>
<span class="todo_ref" href="#todo_31"><sup>todo</sup></span>
<span id="todo_31" class="todo">Make the above reference to a paper use
bibtex. <a href="https://github.com/llsoftsec/llsoftsecbook/issues/159"><img src="data:image/svg+xml;charset=utf-8;base64,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" alt="#159" /></a></span>
Expand All @@ -3011,8 +3012,8 @@ <h3 data-number="7.3.1" id="common-forms-of-fault-injection-attacks"><span class
E.g. When writing a crypto key to a crypto accelerator, forcing the key
value written to be zero (caused to low voltage on bus hardware).</li>
</ul>
<p>Example: Attack on TrustZone for Armv8-M:
https://www.youtube.com/watch?v=4u6BAH8mEDw</p>
<p>Example: <a href="https://www.youtube.com/watch?v=4u6BAH8mEDw">Attack
on TrustZone for Armv8-M</a></p>
<p>There are other forms of physical attacks, but most of them requires
significant effort or cost (e.g. cut open the chip package can carry out
fault injection or readout secret data on chip).</p>
Expand Down
18 changes: 6 additions & 12 deletions book.log
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020) (preloaded format=pdflatex 2024.7.15) 15 JUL 2024 19:30
This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020) (preloaded format=pdflatex 2024.7.16) 16 JUL 2024 14:36
entering extended mode
restricted \write18 enabled.
%&-line parsing enabled.
Expand Down Expand Up @@ -1573,13 +1573,7 @@ Package pdftex.def Info: img/physical_attacks.pdf used on input line 3584.
(pdftex.def) Requested size: 276.00954pt x 94.65086pt.
File: bc-aux-301.mps Graphic file (type mps)
[MP to PDF] (/texlive/2020/texmf-dist/tex/latex/bclogo/bc-aux-301.mps) [59 <./i
mg/physical_attacks.pdf>]
Overfull \hbox (80.5624pt too wide) in paragraph at lines 3654--3656
[]\T1/lmr/m/n/10 (-20) Example: At-tack on Trust-Zone for Armv8-M: https://www.
youtube.com/watch?v=4u6BAH8mEDw
[]

[60]
mg/physical_attacks.pdf>] [60]
Chapter 8.
File: bc-aux-301.mps Graphic file (type mps)
[MP to PDF] (/texlive/2020/texmf-dist/tex/latex/bclogo/bc-aux-301.mps) [61
Expand Down Expand Up @@ -1613,7 +1607,7 @@ t k i ts -[] t h e -[]
Here is how much of TeX's memory you used:
29674 strings out of 480962
527717 string characters out of 5908147
992935 words of memory out of 5000000
993935 words of memory out of 5000000
45547 multiletter control sequences out of 15000+600000
494454 words of font info for 215 fonts, out of 8000000 for 9000
14 hyphenation exceptions out of 8191
Expand Down Expand Up @@ -1644,10 +1638,10 @@ live/2020/texmf-dist/fonts/type1/public/lm/lmri10.pfb></texlive/2020/texmf-dist
lm/lmtk10.pfb></texlive/2020/texmf-dist/fonts/type1/public/lm/lmtt10.pfb></texl
ive/2020/texmf-dist/fonts/type1/public/lm/lmtt8.pfb></texlive/2020/texmf-dist/f
onts/type1/public/lm/lmtti10.pfb>
Output written on build/book.pdf (71 pages, 891642 bytes).
Output written on build/book.pdf (71 pages, 891772 bytes).
PDF statistics:
1751 PDF objects out of 2073 (max. 8388607)
1592 compressed objects within 16 object streams
1754 PDF objects out of 2073 (max. 8388607)
1595 compressed objects within 16 object streams
407 named destinations out of 1000 (max. 500000)
49756 words of extra memory for PDF output out of 51595 (max. 10000000)

75 changes: 40 additions & 35 deletions book.native
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ Pandoc
[ ( "SPDX-License-Identifier"
, MetaInlines [ Str "CC-BY-4.0" ]
)
, ( "VERSION" , MetaString "0-194-g05b0c3d" )
, ( "VERSION" , MetaString "0-196-g248bd20" )
, ( "bibliography"
, MetaList [ MetaInlines [ Str "book.bib" ] ]
)
Expand Down Expand Up @@ -41483,30 +41483,33 @@ Pandoc
, Space
, Str "paper"
, Space
, Quoted
DoubleQuote
[ Str "Fault"
, Space
, Str "Attacks"
, Space
, Str "on"
, Space
, Str "Secure"
, Space
, Str "Embedded"
, Space
, Str "Software:"
, Space
, Str "Threats,"
, Space
, Str "Design"
, SoftBreak
, Str "and"
, Space
, Str "Evaluation"
, Link
( "" , [] , [] )
[ Quoted
DoubleQuote
[ Str "Fault"
, Space
, Str "Attacks"
, Space
, Str "on"
, Space
, Str "Secure"
, Space
, Str "Embedded"
, Space
, Str "Software:"
, Space
, Str "Threats,"
, Space
, Str "Design"
, SoftBreak
, Str "and"
, Space
, Str "Evaluation"
]
]
, Space
, Str "(https://arxiv.org/pdf/2003.10513.pdf),"
( "https://arxiv.org/pdf/2003.10513.pdf" , "" )
, Str ","
, Space
, Str "where"
, Space
Expand Down Expand Up @@ -41800,17 +41803,19 @@ Pandoc
, Para
[ Str "Example:"
, Space
, Str "Attack"
, Space
, Str "on"
, Space
, Str "TrustZone"
, Space
, Str "for"
, Space
, Str "Armv8-M:"
, Space
, Str "https://www.youtube.com/watch?v=4u6BAH8mEDw"
, Link
( "" , [] , [] )
[ Str "Attack"
, Space
, Str "on"
, Space
, Str "TrustZone"
, Space
, Str "for"
, Space
, Str "Armv8-M"
]
( "https://www.youtube.com/watch?v=4u6BAH8mEDw" , "" )
]
, Para
[ Str "There"
Expand Down
Binary file modified book.pdf
Binary file not shown.
10 changes: 5 additions & 5 deletions book.tex
Original file line number Diff line number Diff line change
Expand Up @@ -180,7 +180,7 @@
Copyright 2024 Anders Waldenborg
\href{mailto:[email protected]}{\nolinkurl{[email protected]}}\\

Version 0-194-g05b0c3d
Version 0-196-g248bd20
\clearpage

{
Expand Down Expand Up @@ -3625,8 +3625,8 @@ \subsection{Common forms of Fault injection
instruction execution level are often referred to as fault models, where
one can say that a specific fault injection behaves as an instruction
skip, etc. More details about the concept of fault models can be found
in the paper ``Fault Attacks on Secure Embedded Software: Threats,
Design and Evaluation'' (https://arxiv.org/pdf/2003.10513.pdf), where a
in the paper \href{https://arxiv.org/pdf/2003.10513.pdf}{``Fault Attacks
on Secure Embedded Software: Threats, Design and Evaluation''}, where a
good illustration of the concept is shown in figure 1 of that paper.
\tododiv{Make the above reference to a paper use bibtex.
Expand All @@ -3651,8 +3651,8 @@ \subsection{Common forms of Fault injection
value written to be zero (caused to low voltage on bus hardware).
\end{itemize}
Example: Attack on TrustZone for Armv8-M:
https://www.youtube.com/watch?v=4u6BAH8mEDw
Example: \href{https://www.youtube.com/watch?v=4u6BAH8mEDw}{Attack on
TrustZone for Armv8-M}
There are other forms of physical attacks, but most of them requires
significant effort or cost (e.g.~cut open the chip package can carry out
Expand Down
Loading

0 comments on commit 9cdf9c4

Please sign in to comment.