Skip to main content

Software vulnerabilities

 

Nowadays, dynamic and static evaluation of software robustness against all forms of attacks is mandatory for building trust and ensuring a given level of security. The Cybersecurity Institute aims at developing innovative certification and protection methods for embedded software. 

 

Explore our research demos in softwares vulnerabilities

LAZART

LAZART is a tool based on concolic execution that evaluates the robustness of LLVM code against multi- fault attacks.

To explore more about LAZART and its capabilities, please follow the link : LAZART

FISSC : Fault Injection & Stimulation Secure Collection

FISSC is a collection of C codes with countermeasures against fault injections associated to attack scenarios.

To learn more about FISCC and explore its capabilities, please follow the link: FISSC

BISM : Bytecode Instrumentation for Software Monitoring

BISM is a bytecode-level instrumentation tool for Java-bytecode based language that features an expressive yet high-level control-flow-aware instrumentation API. BISM can be used for static and dynamic analysis of programs.

In particular, BISM was used to instrument programs to detect test inversion and arbitrary jump attacks.

To explore more about BISM and download it, please follow the link: BISM : Bytecode Instrumentation for Software Monitoring

CLAM : Cross-Layer Fault Analysis for Microprocessor Architectures

The CLAM project aims at securing the software components (e.g., microprocessors and microcontrollers) intended for the IoT market, as well as for critical Cyber Physical Systems.

It requires, on the one hand, analyzing their vulnerabilities and, on the other hand, defining hardware and software countermeasures at the most appropriate cost.

To access the demonstration and detailed information, follow the link: CLAM

For a comprehensive list of our publications on the subject, please refer to this link.

Submitted on March 28, 2024

Updated on July 18, 2024