Multi-level Attacks: an Emerging Security Concern for Cryptographic Hardware

被引:0
|
作者
Ali, Sk. Subidh [1 ]
Chakraborty, Rajat Subhra [1 ]
Mukhopadhyay, Debdeep [1 ]
Bhunia, Swamp [2 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
[2] Case Western Reserve Univ, Dept Elect Engn & Comp Sci, Cleveland, OH 44106 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern hardware and software implementations of cryptographic algorithms are subject to multiple sophisticated attacks, such as differential power analysis (DPA) and faultbased attacks. In addition, modern integrated circuit (IC) design and manufacturing follows a horizontal business model where different third- party vendors provide hardware, software and manufacturing services, thus making it difficult to ensure the trustworthiness of the entire process. Such business practices make the designs vulnerable to hard-to-detect malicious modifications by an adversary, termed as "Hardware Trojans". In this paper, we show that malicious nexus between multiple parties at different stages of the design, manufacturing and deployment makes the attacks on cryptographic hardware more potent. We describe the general model of such an attack, which we refer to as Multi-level Attack, and provide an example of it on the hardware implementation of the Advanced Encryption Standard (AES) algorithm, where a hardware Trojan is embedded in the design. We then analytically show that the resultant attack poses a significantly stronger threat than that from a Trojan attack by a single adversary. We validate our theoretical analysis using power simulation results as well as hardware measurement and emulation on a FPGA platform.
引用
收藏
页码:1176 / 1179
页数:4
相关论文
共 50 条
  • [1] Multi-level attacks: An emerging security concern for cryptographic hardware
    Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, West Bengal-721302, India
    不详
    [J]. Proc. Des. Autom. Test Eur. DATE, (1176-1179):
  • [2] Hardware-Based Attacks to Compromise the Cryptographic Security of an Election System
    Bidmeshki, Mohammad-Mahdi
    Reddy, Gaurav Rajavendra
    Zhou, Liwei
    Rajendran, Jeyavijayan
    Makris, Yiorgos
    [J]. PROCEEDINGS OF THE 34TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2016, : 153 - 156
  • [3] A multi-level architecture for hardware Trojan and vulnerability runtime detection and response towards cryptographic IP
    Dong, Zhaojie
    Chen, Lan
    Li, Ying
    [J]. IEICE ELECTRONICS EXPRESS, 2022, 19 (11):
  • [4] Hardware Security in Emerging Technologies: Vulnerabilities, Attacks, and Solutions
    Karimi, Naghmeh
    Basu, Kanad
    Chang, Chip-Hong
    Fung, Jason M.
    [J]. IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2021, 11 (02) : 223 - 227
  • [5] Security and cryptographic hardware implementations
    Sklavos, N
    [J]. Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 768 - 769
  • [6] Extending linux for multi-level security
    Wilson, George
    Weidner, Klaus
    Salem, Loulwa
    [J]. PROCEEDINGS OF THE THIRD ANNUAL SECURITY ENHANCED LINUX SYMPOSIUM, 2007, : 101 - 109
  • [7] Multi-level security requirements for hypervisors
    Karger, PA
    [J]. 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 240 - 248
  • [8] The Multi-level Security for the Android OS
    Oh, Ji-Soo
    Park, Min-Woo
    Chung, Tai-Myoung
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2014, PT IV, 2014, 8582 : 743 - +
  • [9] Efficient Padding Oracle Attacks on Cryptographic Hardware
    Bardou, Romain
    Focardi, Riccardo
    Kawamoto, Yusuke
    Simionato, Lorenzo
    Steel, Graham
    Tsay, Joe-Kai
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 608 - 625
  • [10] Design of Hardware IP Core Security Protection Based on Multi-Level Co-obfuscation
    Zhang Huihong
    Li Jing
    Wu Qiufeng
    Zhang Yuejun
    Wang Pengjun
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (09) : 2458 - 2465