Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Formally Verified Hardening of C Programs Against Hardware Fault Injection

ACM SIGPLAN via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This conference talk from CPP 2025 presents research on formally verified methods to protect C programs against hardware fault injection attacks. Learn how researchers Basile Pesin, Sylvain Boulmé, David Monniaux, and Marie-Laure Potet implemented and verified software countermeasures in the CompCert verified compiler. Discover their approach to modeling fault attacks—malicious hardware manipulations that alter software behavior through electromagnetic or laser pulses—and how they developed control flow protection mechanisms as program transformations over CompCert's RTL intermediate representation. The presentation covers formal proofs demonstrating that these countermeasures maintain program behavior during normal execution while effectively catching or neutralizing attacks during fault injection. The researchers also share evaluation results using the Lazart symbolic fault injection tool and discuss the performance impact of their security optimizations. This 34-minute talk is particularly relevant for those working in cryptography services, authentication, boot-loaders, or firmware security.

Syllabus

[CPP'25] Formally verified hardening of C programs against hardware fault injection

Taught by

ACM SIGPLAN

Reviews

Start your review of Formally Verified Hardening of C Programs Against Hardware Fault Injection

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.