ABSTRACT
In this paper we detail the latest developments regarding optical fault injection on secure micro controllers. On these targets, a combination of countermeasures makes fault injection less than trivial. We develop fault injection methods to show experimentally that protected smart cards are still vulnerable. We perform power signal guided fault injection, using a triggering mechanism based on real-time pattern recognition. Furthermore, the use of jitter-free diode lasers shows current countermeasures may be inadequate for the near future.
Recommendations
AFIA: ATPG-Guided Fault Injection Attack on Secure Logic Locking
AbstractThe outsourcing of the design and manufacturing of integrated circuits has raised severe concerns about the piracy of Intellectual Properties and illegal overproduction. Logic locking has emerged as an obfuscation technique to protect outsourced ...
Investigation of Parameters Influencing the Success of Optical Fault Attacks
Foundations and Practice of SecurityAbstractFault attacks are a very powerful class of attacks targeting cryptographic primitives implemented on e.g., microcontrollers. These attacks are used to uncover some secret information by analysing the results of faulty computations. The faulty ...
Fault Injection into VHDL Models: Experimental Validation of a Fault Tolerant Microcomputer System
EDCC-3: Proceedings of the Third European Dependable Computing Conference on Dependable ComputingThis work presents a campaign of fault injection to validate the dependability of a fault tolerant microcomputer system. The system is duplex with cold stand-by sparing, parity detection and a watchdog timer. The faults have been injected on a chip-...
Comments