Loading [MathJax]/extensions/MathMenu.js
Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller | IEEE Conference Publication | IEEE Xplore

Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller


Abstract:

Injection of transient faults as a way to attack cryptographic implementations has been largely studied in the last decade. Several attacks that use electromagnetic fault...Show More

Abstract:

Injection of transient faults as a way to attack cryptographic implementations has been largely studied in the last decade. Several attacks that use electromagnetic fault injection against hardware or software architectures have already been presented. On micro controllers, electromagnetic fault injection has mostly been seen as a way to skip assembly instructions or subroutine calls. However, to the best of our knowledge, no precise study about the impact of an electromagnetic glitch fault injection on a micro controller has been proposed yet. The aim of this paper is twofold: providing a more in-depth study of the effects of electromagnetic glitch fault injection on a state-of-the-art micro controller and building an associated register-transfer level fault model.
Date of Conference: 20-20 August 2013
Date Added to IEEE Xplore: 10 October 2013
Electronic ISBN:978-0-7695-5059-6
Conference Location: Los Alamitos, CA, USA
References is not available for this document.

Select All
1.
P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," Advances in Cryptology-CRYPTO96, pp. 104-113, 1996. (Online). Available: http://www.springerlink.com/index/ 4el17cvre3gxt4gd.pdf
2.
D. Agrawal, B. Archambeault, J. R. Rao, P. Rohatgi, and Y. Heights, "The EM Side-Channel(s)," in Cryptographic Hardware and Embedded Systems-CHES 2002, ser. Lecture Notes in Computer Science, B. S. Kaliski, c. K. Koç, and C. Paar, Eds., vol. 2523. Berlin, Heidelberg: Springer Berlin Heidelberg, Feb. 2003, pp. 29-45. (Online). Available: http://www.springerlink. com/index/10.1007/3-540-36400-5
3.
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in Proceedings of the 19th Annual International Cryptology Conference, Santa Barbara, California, USA, 1999, pp. 1-10. (Online). Available: http://www.springerlink.com/index/ kx35ub53vtrkh2nx.pdf
4.
A. Schl̈osser, D. Nedospasov, J. Kr̈amer, S. Orlic, and J.-P. Seifert, "Simple Photonic Emission Analysis of AES Photonic Side Channel Analysis for the Rest of Us," Cryptographic Hardware and Embedded Systems-CHES 2012, pp. 41-57, 2012.
5.
D. Boneh, R. A. DeMillo, and R. J. Lipton, "On the Importance of Checking Cryptographic Protocols for Faults," Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques, vol. 1233, pp. 37-51, 1997. (Online). Available: http: //citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.48.9764
6.
H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan, "The Sorcerers Apprentice Guide to Fault Attacks," Proceedings of the IEEE, vol. 94, no. 2, pp. 370-382, Feb. 2006. (Online). Available: http://ieeexplore. ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1580506
7.
D. Karaklajíc, J.-M. Schmidt, and I. Verbauwhede, "Hardware Designers Guide to Fault Attacks," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 258754, pp. 1-1, 2013. (Online). Available: http://ieeexplore.ieee.org/ xpls/abs all.jsp?arnumber=6425517http://ieeexplore. ieee.org/ lpdocs/epic03/wrapper.htm?arnumber=6425517
8.
A. Barenghi, L. Breveglieri, I. Koren, and D. Naccache, "Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures," Proceedings of the IEEE, vol. 100, no. 11, pp. 3056-3076, Nov. 2012. (Online). Available: http://ieeexplore.ieee.org/xpls/abs all.jsp?arnumber=6178001
9.
S. P. Skorobogatov and R. J. Anderson, "Optical Fault Induction Attacks," Cryptographic Hardware and Embedded Systems-CHES 2002, vol. 2523, no. August, pp. 2-12, 2003. (Online). Available: http://www.springerlink.com/ index/dmjmf1pt7lr1c962.pdf
10.
J.-M. Schmidt and M. Hutter, "Optical and EM Fault-Attacks on CRT-based RSA: Concrete Results," in Proceedings of the 15th Austrian Workhop on Microelectronics-Austrochip 2007, Graz, Austria, 2007. (Online). Available: http://citeseerx.ist.psu.edu/viewdoc/ download?doi=10.1.1.121. 5741=rep1=pdf
11.
G. Canivet, P. Maistri, R. Leveugle, J. Cĺediere, F. Valette, and M. Renaudin, "Glitch and Laser Fault Attacks onto a Secure AES Implementation on a SRAM-Based FPGA," Journal of Cryptology, vol. 24, no. 2, pp. 247-268, Oct. 2010. (Online). Available: http://www.springerlink.com/ index/10.1007/s00145-010-9083-9
12.
M. Agoyan, J.-m. Dutertre, A.-p. Mirbaha, D. Naccache, A.-l. Ribotta, and A. Tria, "How to Flip a Bit?" in On-Line Testing Symposium (IOLTS), 2010 IEEE 16th International. IEEE, 2010, pp. 235-239.
13.
J. Balasch, B. Gierlichs, and I. Verbauwhede, "An Indepth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs," in 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography. IEEE, Sep. 2011, pp. 105-114. (Online). Available: http: //www.cosic.esat.kuleuven.be/ publications/article-2059.pdf
14.
J. J. A. Fournier, S. Moore, H. Li, R. Mullins, and G. Taylor, "Security Evaluation of Asynchronous Circuits," in Cryptographic Hardware and Embedded Systems-CHES 2003, 2003, pp. 137-151.
15.
L. Zussa, J.-m. Dutertre, J. Cĺediere, B. Robisson, and A. Tria, "Investigation of timing constraints violation as a fault injection means," in 27th Conference on Design of Circuits and Integrated Systems (DCIS), Avignon, France, 2012. (Online). Available: http://hal-emse.ccsd.cnrs. fr/emse-00742652
16.
S. Skorobogatov, "Local Heating Attacks on Flash Memory Devices," in IEEE International Workshop on Hardware-Oriented Security and Trust, 2009-HOST09. IEEE, 2009, pp. 1-6. (Online). Available: http://www.cl.cam.ac. uk/?sps32/host2009-flash heat.pdf
17.
A. Dehbaoui, J.-M. Dutertre, B. Robisson, and A. Tria, "Electromagnetic Transient Faults Injection on a Hardware and a Software Implementations of AES," 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 7-15, Sep. 2012. (Online). Available: http://ieeexplore.ieee. org/lpdocs/epic03/wrapper.htm?arnumber=6305224
18.
J.-M. Schmidt and C. Herbst, "A Practical Fault Attack on Square and Multiply," in 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, L. Breveglieri, S. Gueron, I. Koren, D. Naccache, and J. P. Seifert, Eds. IEEE, Aug. 2008, pp. 53-58. (Online). Available: http://ieeexplore.ieee.org/lpdocs/epic03/ wrapper.htm?arnumber=4599557
19.
S. Yen and M. Joye, "Checking before output may not be enough against fault-based cryptanalysis," Computers, IEEE Transactions on, vol. 49, no. September 1996, pp. 967-970, 2000. (Online). Available: http://ieeexplore.ieee.org/xpls/abs all.jsp?arnumber=869328
20.
E. Biham and A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems," in Proceedings of the 17th Annual International Cryptology Conference, no. September 1996, Santa Barbara, California, USA, 1997. (Online). Available: http://info.psu.edu.sa/psu/cis/ abuelyaman/Research/DFA-Secret-Key. pdf
21.
A. Barenghi, L. Breveglieri, I. Koren, G. Pelosi, and F. Regazzoni, "Countermeasures against fault attacks on software implemented AES," in Proceedings of the 5th Workshop on Embedded Systems Security-WESS 10. New York, New York, USA: ACM Press, 2010, pp. 1-10. (Online). Available: http://dl.acm.org/citation.cfm?id=1873555
22.
I. Verbauwhede, D. Karaklajic, and J.-M. Schmidt, "The Fault Attack Jungle-A Classification Model to Guide You," in 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography. IEEE, Sep. 2011, pp. 3-8. (Online). Available: http://ieeexplore.ieee.org/lpdocs/epic03/ wrapper.htm?arnumber= 6076462
23.
J. Yiu, The Definitive Guide To The ARM Cortex-M3. Elsevier Science, 2009.
24.
ARM, "ARM Architecture Reference Manual-Thumb-2 Supplement," 2005.
25.
S. Carlier, "Electro Magnetic Fault Injection," University of Amsterdam, Amsterdam, Tech. Rep., 2012. (Online). Available: http://staff.science.uva.nl/?delaat/rp/2011-2012/ p19/report.pdf
26.
A. Spruyt, "Building fault models for microcontrollers," University of Amsterdam, Amsterdam, Tech. Rep., 2012. (Online). Available: http://staff.science.uva.nl/?delaat/ rp/2011-2012/p61/report.pdf
27.
F. Poucheret, L. Chusseau, B. Robisson, and P. Maurine, "Local electromagnetic coupling with CMOS integrated circuits," in 2011 8th Workshop on Electromagnetic Compatibility of Integrated Circuits. IEEE, 2011, pp. 137-141.
28.
ARM, "AMBA 3 AHB-Lite Protocol," 2006.
29.
A. Barenghi, G. Bertoni, E. Parrinello, and G. Pelosi, "Low Voltage Fault Attacks on the RSA Cryptosystem," in 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, Sep. 2009, pp. 23-31. Online). Available: http://ieeexplore.ieee.org/lpdocs/epic03/ wrapper.htm?arnumber= 5412860
30.
J.-M. Schmidt and M. Medwed, "A Fault Attack on ECDSA," in 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, Sep. 2009, pp. 93-99. (Online). Available: http://ieeexplore.ieee.org/lpdocs/ epic03/wrapper.htm?arnumber=5412852

Contact IEEE to Subscribe

References

References is not available for this document.