Avatar: Reinforcing Fault Attack Countermeasures in EDA with Fault Transformations

被引:0
|
作者
Roy, Prithwish Basu [1 ]
Patanjali, S. L. P. S. K. [2 ]
Rebeiro, Chester [1 ]
机构
[1] Indian Inst Technol Madras, Madras, Tamil Nadu, India
[2] Univ Florida, Gainesville, FL USA
关键词
Fault injection attacks; Gate Reconfiguration; EDA Security; CONCURRENT ERROR-DETECTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography hardware are highly vulnerable to a class of side-channel attacks known as Differential Fault Analysis (DFA). These attacks exploit fault induced errors to compromise secret keys from ciphers within a few seconds. A bias in the error probabilities strengthens the attack considerably. It abets in bypassing countermeasures and is also the basis of powerful attack variants like the Differential Fault Intensity Analysis (DFIA) and Statistical Ineffective Fault Analysis (SIFA). In this paper, we make two significant contributions. First, we identify the correlation between fault induced errors and gate-level parameters like the threshold voltage, gate size, and V-DD. We show how these parameters can influence the bias in the error probabilities. Then, we propose an algorithm, called Avatar, that carefully tunes gate-level parameters to strengthen the redundancy countermeasures against DFA, DFIA, and SIFA attacks with no additional logic needed. The central idea of Avatar is to reconfigure gates in the redundant circuits so that each circuit has a unique behavior to faults, making fault detection much more efficient. In AES for instance, fault attack resistance improves by 40% for DFA and DFIA, and 99% in the case of SIFA. Avatar incurs negligible area overheads and can be quickly adopted in any cipher design. It can be incorporated in commercial EDA flows and provides users with tunable knobs to trade-off performance and power consumption, for fault attack security.
引用
收藏
页码:417 / 422
页数:6
相关论文
共 50 条
  • [31] Differential Fault Attack on Espresso
    Bathe, Bhagwan
    Tiwari, Siddhartha
    Anand, Ravi
    Roy, Dibyendu
    Maitra, Subhamoy
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 271 - 286
  • [32] Differential Fault Attack on LEA
    Jap, Dirmanto
    Breier, Jakub
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2015, 9357 : 265 - 274
  • [33] Differential Fault Attack on SIMECK
    Nalla, Venu
    Sahu, Rajeev Anand
    Saraswat, Vishal
    PROCEEDINGS OF THE THIRD WORKSHOP ON CRYPTOGRAPHY AND SECURITY IN COMPUTING SYSTEMS (CS2 2016), 2016, : 45 - 48
  • [34] Differential fault attack on Camellia
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
    Chin J Electron, 2009, 1 (13-19):
  • [35] A Fault Attack Robust TRNG
    Boehl, E.
    Ihle, M.
    2012 IEEE 18TH INTERNATIONAL ON-LINE TESTING SYMPOSIUM (IOLTS), 2012, : 114 - 117
  • [36] Side-channel leakage from sensor-based countermeasures against fault injection attack
    Sugawara, Takeshi
    Shoji, Natsu
    Sakiyama, Kazuo
    Matsuda, Kohei
    Miura, Noriyuki
    Nagata, Makoto
    MICROELECTRONICS JOURNAL, 2019, 90 : 63 - 71
  • [37] Hardware Countermeasures Benchmarking against Fault Attacks
    Potestad-Ordonez, Francisco Eugenio
    Tena-Sanchez, Erica
    Acosta-Jimenez, Antonio Jose
    Jimenez-Fernandez, Carlos Jesus
    Chaves, Ricardo
    APPLIED SCIENCES-BASEL, 2022, 12 (05):
  • [38] A New Type of Fault-Based Attack: Fault Behavior Analysis
    Li, Yang
    Ohta, Kazuo
    Sakiyama, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 177 - 184
  • [39] Fault Model Analysis of DRAM under Electromagnetic Fault Injection Attack
    Liu, Qiang
    Guo, Longtao
    Tang, Honghui
    2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,
  • [40] Methodology of Modeling Applied to Fault Injection Based on EDA
    Liu, Mengmeng
    Ren, Zhanyong
    Liu, Dandan
    Zeng, Zhaoyang
    2010 PROGNOSTICS AND SYSTEM HEALTH MANAGEMENT CONFERENCE, 2010, : 358 - 364