Fault injection as an oscilloscope: Fault correlation analysis

被引:0
|
作者
Spruyt A. [1 ]
Milburn A. [1 ]
Chmielewski Ł. [2 ]
机构
[1] Vrije Universiteit Amsterdam, Amsterdam
[2] Radboud University, Nijmegen
来源
| 1600年 / Ruhr-University of Bochum卷 / 2021期
基金
欧盟地平线“2020”;
关键词
Correlation Power Analysis; Fault Injection; Fault Propagation; Side-Channel Analysis;
D O I
10.46586/tches.v2021.i1.192-216
中图分类号
学科分类号
摘要
Fault Injection (FI) attacks have become a practical threat to modern cryptographic implementations. Such attacks have recently focused more on exploita-tion of implementation-centric and device-specific properties of the faults. In this paper, we consider the parallel between SCA attacks and FI attacks; specifically, that many FI attacks rely on the data-dependency of activation and propagation of a fault, and SCA attacks similarly rely on data-dependent power usage. In fact, these are so closely related that we show that existing SCA attacks can be directly applied in a purely FI setting, by translating power FI results to generate FI ‘probability traces’ as an analogue of power traces. We impose only the requirements of the equivalent SCA attack (e.g., knowledge of the input plaintext for CPA on the first round), along with a way to observe the status of the target (whether or not it has failed and been “muted” after a fault). We also analyse existing attacks such as Fault Template Analysis in the light of this parallel, and discuss the limitations of our methodology. To demonstrate that our attacks are practical, we first show that SPA can be used to recover RSA private exponents using FI attacks. Subsequently, we show the generic nature of our attacks by performing DPA on AES after applying FI attacks to several different targets (with AVR, 32-bit ARM and RISC-V CPUs), using different software on each target, and do so with a low-cost (i.e., less than $50) power fault injection setup. We call this technique Fault Correlation Analysis (FCA), since we perform CPA on fault probability traces. To show that this technique is not limited to software, we also present FCA results against the hardware AES engine supported by one of our targets. Our results show that even without access to the ciphertext (e.g., where an FI redundancy countermeasure is in place, or where ciphertext is simply not exposed to an attacker in any circumstance) and in the presence of light jitter, FCA attacks can successfully recover keys on each of these targets. © 2020, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:192 / 216
页数:24
相关论文
共 50 条
  • [21] Fault Injection Technique Approach for Testbench Analysis
    Banciu, N. A.
    Toacse, G.
    PROCEEDINGS OF 2010 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS (AQTR 2010), VOLS. 1-3, 2010,
  • [22] Fault injection approach based on dependence analysis
    Moraes, RLO
    Martins, E
    Mendes, NV
    Proceedings of the 29th Annual International Computer Software and Applications Conference, Workshops and Fast Abstracts, 2005, : 181 - 188
  • [23] Laser Fault Injection at the CMOS 28 nm Technology Node: an Analysis of the Fault Model
    Dutertre, Jean-Max
    Beroulle, Vincent
    Candelier, Philippe
    De Castro, Stephan
    Faber, Louis-Barthelemy
    Flottes, Marie-Lise
    Gendrier, Philippe
    Hely, David
    Leveugle, Regis
    Maistri, Paolo
    Di Natale, Giorgio
    Papadimitriou, Athanasios
    Rouzeyre, Bruno
    2018 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC), 2018, : 1 - 6
  • [24] Fault list compaction through static timing analysis for efficient fault injection experiments
    Reorda, MS
    Violante, M
    17TH IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI SYSTEMS, PROCEEDINGS, 2002, : 263 - 271
  • [25] Efficient Fault Emulation based on Post-Injection Fault Effect Analysis (PIFEA)
    Grinschgl, Johannes
    Krieg, Armin
    Steger, Christian
    Weiss, Reinhold
    Bock, Holger
    Haid, Josef
    2012 IEEE 55TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2012, : 526 - 529
  • [26] Correlation analysis of statistical facies fault models
    Vishnevsky, D. M.
    Kolyukhin, D. R.
    Lisitsa, V. V.
    Protasov, M. I.
    Reshetova, G. V.
    Tcheverda, V. A.
    Qu, D.
    Tveranger, J.
    DOKLADY EARTH SCIENCES, 2017, 473 (02) : 477 - 481
  • [27] Correlation analysis of statistical facies fault models
    D. M. Vishnevsky
    D. R. Kolyukhin
    V. V. Lisitsa
    M. I. Protasov
    G. V. Reshetova
    V. A. Tcheverda
    D. Qu
    J. Tveranger
    Doklady Earth Sciences, 2017, 473 : 477 - 481
  • [28] Network fault handling, correlation and statistical analysis
    Girardin, Jean-Jacques
    Technische Mitteilungen/Bulletin Technique, 74 (02):
  • [29] The fault signal analysis using correlation dimension
    Li Na
    Cheng Jihong
    2006 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-4, 2006, : 3094 - 3097
  • [30] Fault injection mechanism
    Res Disclos, 414 (1402):