BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.riscv-europe.org//eu-summit-2026//speaker//ARSJVN
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-eu-summit-2026-CEW33C@cfp.riscv-europe.org
DTSTART;TZID=CET:20260609T112000
DTEND;TZID=CET:20260609T113000
DESCRIPTION:Fault Injection Attacks (FIAs) induce transient hardware faults
  to subvert software security mechanisms\, yet assessing fault resilience\
 , especially during early design phases\, remains impractical without spec
 ialized laboratory equipment. Microarchitectural simulation provides a rep
 roducible and scalable alternative. This paper presents InjectV\, a gem5-b
 ased fault injection framework targeting RISC-V systems\, which employs tr
 ace-guided fault injection by identifying Candidate Injection Points (CIPs
 ) at security-critical operations including control-flow branches and cond
 itional comparisons. Supporting transient corruption of architectural regi
 sters and physical memory under full-system simulation\, InjectV demonstra
 tes that guided fault injection requires 95.8% fewer injections than rando
 m exploration to expose successful attacks on the FISSC VerifyPIN benchmar
 ks.
DTSTAMP:20260522T162433Z
LOCATION:Poster Island A
SUMMARY:InjectV: Modeling Fault Injection Attacks in RISC-V Simulation Envi
 ronment - Niccolò Lentini\, Giorgio Fardo
URL:https://cfp.riscv-europe.org/eu-summit-2026/talk/CEW33C/
END:VEVENT
END:VCALENDAR
