Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,404 Hits in 4.0 sec

Electromagnetic analysis and fault injection onto secure circuits

P. Maistri, R. Leveugle, L. Bossuet, A. Aubert, V. Fischer, B. Robisson, N. Moro, P. Maurine, J.-M. Dutertre, M. Lisart
2014 2014 22nd International Conference on Very Large Scale Integration (VLSI-SoC)  
In this paper, we review the recent results obtained on this subject, with a particular focus on EM as a fault injection tool.  ...  These attacks exploit the correlation existing between the computed data and variables such as computation time, consumed power, and electromagnetic (EM) emissions.  ...  EM Power Coupling As anticipated in the previous section, understanding and predict the consequences of an EM pulsed injection onto a secure circuit is a critical challenge.  ... 
doi:10.1109/vlsi-soc.2014.7004182 dblp:conf/vlsi/MaistriLBAFRMMDL14 fatcat:g4vl52eomfhinkcmag7mjxpkee

Physical Security Bounds Against Tampering [chapter]

Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi
2006 Lecture Notes in Computer Science  
Which kind of circuit based security can ever be guaranteed if all computations are vulnerable towards fault injection?  ...  Therefore, we present an adversarial model with a strong focus on fault injection techniques based on radiation and particle impact.  ...  These circuits make use of redundant data encoding, i.e., each bit is encoded onto two wires.  ... 
doi:10.1007/11767480_17 fatcat:tjgnyanjojdf5aojfb2df4jqnm

On the security of RFID devices against implementation attacks

Michael Hutter, Thomas Plos, Martin Feldhofer
2010 International Journal of Security and Networks (IJSN)  
In this paper, we evaluate the efficiency of implementation attacks by conducting side-channel attacks and fault analysis on both High Frequency (HF) and Ultra-High Frequency (UHF) RFID tags.  ...  Since 2007, he is a member of the VLSI and security group at the Institute for Applied Information Processing and Communications (IAIK) at TUG.  ...  This kind of fault-injection is therefore more complex in term of EM shielding, fault-injection handling, and human security.  ... 
doi:10.1504/ijsn.2010.032209 fatcat:wrr52g3ywnfjfdeheslrjl6nfm

Information Leakage Threats for Cryptographic Devices Using IEMI and EM Emission

Ko Nakamura, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
2018 IEEE transactions on electromagnetic compatibility (Print)  
Furthermore, we apply a fault analysis method that combines the injection timing estimation method and fault injection by IEMI in a practical experimental environment.  ...  However, the timing of fault injections cannot be controlled with this approach, and it is difficult to obtain faulty ciphertexts for use in secret key analysis by differential fault analysis (DFA).  ...  Such techniques include optical fault injection using flash or laser [6] ; under-powering to cause setup time violations [7] ; and electromagnetic (EM) pulse injection over cryptographic integrated circuits  ... 
doi:10.1109/temc.2017.2766139 fatcat:vucarsx6nbegrhcpyhxlznt7ui

BADFET: Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault Injection

Ang Cui, Rick Housley
2017 Workshop on Offensive Technologies  
Numerous Electromagnetic Fault Injection (EMFI) techniques have been used to attack FPGAs, ASICs, cryptographic devices, and microcontrollers.  ...  Unlike other classes of fault injection techniques, EMFI-based attacks can, in theory, be carried out non-invasively without requiring physical contact with the victim device.  ...  Electromagnetic Fault Injection (EMFI) has both advantages and disadvantages over the other above mentioned modalities.  ... 
dblp:conf/woot/CuiH17 fatcat:njf3qd6amrauvdrs64dz7tbklq

Security Evaluation of Asynchronous Circuits [chapter]

Jacques J. A. Fournier, Simon Moore, Huiyun Li, Robert Mullins, George Taylor
2003 Lecture Notes in Computer Science  
This has led us to investigate the novel approach of design-time security analysis rather than rely on post manufacture analysis.  ...  In this paper we describe the tests performed and show that asynchronous circuits can provide better tamperresistance.  ...  Special thanks are also due to the Gemplus Card Security Group for their testing and analysis of the Springbank test chip, in particular to Jean-François Dhem and Christophe Mourtel for useful comments  ... 
doi:10.1007/978-3-540-45238-6_12 fatcat:6ii7657kybdqjkurjsvuih76by

Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices [article]

Colin O'Flynn
2020 IACR Cryptology ePrint Archive  
Body Biasing Injection (BBI) uses a voltage applied with a physical probe onto the backside of the integrated circuit die.  ...  Compared to other techniques such as electromagnetic fault injection (EMFI) or Laser Fault Injection (LFI), this technique appears less popular in academic literature based on published results.  ...  [20] [18] [23] , electromagnetic faults [18] , X-Rays [2] , and body biasing injection (BBI) [11] [12] .  ... 
dblp:journals/iacr/OFlynn20a fatcat:zvf6gkmtfbfubgaovqkcyxw44y

Detecting Electromagnetic Injection Attack on FPGAs Using In-situ Timing Sensors

Surabhi Satyajit Gujar, Leyla Nazhandali
2020 Journal of Hardware and Systems Security  
The area of Electromagnetic Fault Injection (EMFI) wherein attackers can use electromagnetic (EM) pulses to induce faults has started garnering increasing attention.  ...  This sensor can successfully detect most of the electromagnetic injected faults with high precision.  ...  and predictable electromagnetic pulses which are used for EM fault injection in embedded processors.  ... 
doi:10.1007/s41635-020-00096-9 fatcat:g5pu6spcmzastg5gczu3ls62qi

Parity Check Based Fault Detection against Timing Fault Injection Attacks

Maoshen Zhang, He Li, Peijing Wang, Qiang Liu
2022 Electronics  
Fault injection technologies can be utilized to steal secret information inside integrated circuits (ICs), and thus cause serious information security threats.  ...  However, the contradiction between security and overhead restricts the further development and applications of parity check in fault injection detection.  ...  In experiments, a fault is injected if the circuit output is wrong, and the fault number is obtained by comparing the circuit output, and the correct ciphertexts [19] .  ... 
doi:10.3390/electronics11244082 fatcat:yjam5wajcvevhnifvrojot7km4

Fault Attacks on Secure Embedded Software: Threats, Design and Evaluation [article]

Bilgiday Yuce, Patrick Schaumont, Marc Witteman
2020 arXiv   pre-print
We present a detailed discussion of the anatomy of a fault attack, and we make a review of fault attack evaluation techniques.  ...  Fault attacks break and exploit that assumption. Through the careful introduction of targeted faults, an adversary modifies the control-flow or data-flow integrity of software.  ...  ACKNOWLEDGEMENTS The authors would like to thank Dennis Vermoen from Riscure Security Lab for his help and support.  ... 
arXiv:2003.10513v1 fatcat:paebhdl4cjhfvp7o5skttooyym

Microcontroller Implementation of Simultaneous Protections Against Observation and Perturbation Attacks for ECC

Audrey Lucas, Arnaud Tisserand
2018 Proceedings of the 15th International Joint Conference on e-Business and Telecommunications  
., 2004; Cohen and Frey, 2005 ) is a PKC based on elliptic curves (ECs).  ...  In embedded systems, it is vulnerable to both observation and perturbation attacks. Most of protections only target one of these two types of attacks.  ...  FAs and Countermeasures Lasers, electromagnetic radiations, variations in supply voltage or circuit temperature, glitches in clock signals are used to disturb the circuit by injecting fault(s) during algorithm  ... 
doi:10.5220/0006884605700577 dblp:conf/icete/LucasT18 fatcat:ojknxfsfarbojogcjv3wdb24py

The DFA/DFT‐based hacking techniques and countermeasures: Case study of the 32‐bit AES encryption crypto‐core

Mouna Karmani, Noura Benhadjyoussef, Belgacem Hamdi, Mohsen Machhout
2021 IET Computers & Digital Techniques  
Integrated circuits (ICs) design plays a significant role in the embedded-system performance, reliability and security.  ...  In addition, with or without insertion of DFT circuitry, the crypto-core is always exposed to the powerful differential fault analysis (DFA) attack.  ...  voltage glitches, electromagnetic pulses, and laser shots.  ... 
doi:10.1049/cdt2.12013 fatcat:zzpzutktundtlc3q5nathppntq

EM Injection: Fault Model and Locality

S. Ordas, L. Guillaume-Sage, Philippe Maurine
2015 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)  
EM injection recently emerged as an effective medium for fault injection. This paper presents an analysis of the IC susceptibility to EM pulses.  ...  It highlights that faults produced by EM pulse injection are not timing faults but correspond to a different model which is presented in this paper.  ...  INTRODUCTION Besides power and ElectroMagnetic (EM) analyses [6] , [5] , fault injection constitutes [2] a serious threat against secure circuits.  ... 
doi:10.1109/fdtc.2015.9 dblp:conf/fdtc/OrdasGM15 fatcat:onp7z6gfingknd2vliq2h2hkma

Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis [article]

Carlton Shepherd, Konstantinos Markantonakis, Nico van Heijningen, Driss Aboulkassimi, Clément Gaine, Thibaut Heckmann, David Naccache
2021 arXiv   pre-print
In total, we comprehensively survey over 50 fault injection and side-channel attack papers published between 2009-2021.  ...  In this survey, we consolidate recent developments in physical fault injections and side-channel attacks on modern mobile devices.  ...  The authors would like to thank the EXFILES WP5 project partners for comments and discussions around the topic of this work.  ... 
arXiv:2105.04454v5 fatcat:27ldfag7ejgvxh7cbs2qnevb24

An Embedded System for Practical Security Analysis of Contactless Smartcards [chapter]

Timo Kasper, Dario Carluccio, Christof Paar
2007 Lecture Notes in Computer Science  
ISO 14443 compliant smartcards are widely-used in privacy and security sensitive applications. Due to the contactless interface, they can be activated and read out from a distance.  ...  Thus, relay and other attacks are feasible, even without the owner noticing it. Tools being able to perform these attacks and carry out security analyses need to be developed.  ...  Integrated in a measurement system, the proposed tool can help to carry out security analyses, such as a DEMA or a remote power analysis, and assist fault injection attacks.  ... 
doi:10.1007/978-3-540-72354-7_13 fatcat:djiwrnz6brbzrirjaklw2dajge
« Previous Showing results 1 — 15 out of 1,404 results