Multi-level Attacks: an Emerging Security Concern for Cryptographic Hardware

被引:0
|
作者
Ali, Sk. Subidh [1 ]
Chakraborty, Rajat Subhra [1 ]
Mukhopadhyay, Debdeep [1 ]
Bhunia, Swamp [2 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
[2] Case Western Reserve Univ, Dept Elect Engn & Comp Sci, Cleveland, OH 44106 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern hardware and software implementations of cryptographic algorithms are subject to multiple sophisticated attacks, such as differential power analysis (DPA) and faultbased attacks. In addition, modern integrated circuit (IC) design and manufacturing follows a horizontal business model where different third- party vendors provide hardware, software and manufacturing services, thus making it difficult to ensure the trustworthiness of the entire process. Such business practices make the designs vulnerable to hard-to-detect malicious modifications by an adversary, termed as "Hardware Trojans". In this paper, we show that malicious nexus between multiple parties at different stages of the design, manufacturing and deployment makes the attacks on cryptographic hardware more potent. We describe the general model of such an attack, which we refer to as Multi-level Attack, and provide an example of it on the hardware implementation of the Advanced Encryption Standard (AES) algorithm, where a hardware Trojan is embedded in the design. We then analytically show that the resultant attack poses a significantly stronger threat than that from a Trojan attack by a single adversary. We validate our theoretical analysis using power simulation results as well as hardware measurement and emulation on a FPGA platform.
引用
收藏
页码:1176 / 1179
页数:4
相关论文
共 50 条
  • [11] Fault-based Attacks on Cryptographic Hardware
    Polian, Ilia
    Kreuzer, Martin
    [J]. PROCEEDINGS OF THE 2013 IEEE 16TH INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS & SYSTEMS (DDECS), 2013, : 12 - 17
  • [12] Hardware emulation of multi-level decision feedback equalization
    Schmid, V
    Sands, NP
    [J]. IEEE TRANSACTIONS ON MAGNETICS, 1996, 32 (05) : 3947 - 3949
  • [13] Enhancing Backdoor Attacks With Multi-Level MMD Regularization
    Xia, Pengfei
    Niu, Hongjing
    Li, Ziqiang
    Li, Bin
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1675 - 1686
  • [14] Energy security in a multi-level governance perspective
    Hermanson, Ann-Sofie
    [J]. MARINE POLICY, 2018, 98 : 301 - 308
  • [15] Multi-Level Proactive Security Auditing for Clouds
    Majumdar, Suryadipta
    Tabiban, Azadeh
    Mohammady, Meisam
    Oqaily, Alaa
    Jarraya, Yosr
    Pourzandi, Makan
    Wang, Lingyu
    Debbabi, Mourad
    [J]. 2019 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2019, : 219 - 226
  • [16] Multi-Level Security Embedded With Surveillance System
    Goyal, Sanket
    Desai, Pranali
    Swaminathan, Vasanth
    [J]. IEEE SENSORS JOURNAL, 2017, 17 (22) : 7497 - 7501
  • [17] Hardware Attacks and Security Education
    Lo, Dan Chia-Tien
    Qian, Kai
    Chen, Wei
    [J]. PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2, 2016, : 253 - 257
  • [18] Vulnerability modeling of cryptographic hardware to power analysis attacks
    Moradi, Amir
    Salmasizadeh, Mahmoud
    Shalmani, Mohammad Taghi Manzuri
    Eisenbarth, Thomas
    [J]. INTEGRATION-THE VLSI JOURNAL, 2009, 42 (04) : 468 - 478
  • [19] Boundary Scan Security Enhancements for a Cryptographic Hardware
    Nikodem, Maciej
    [J]. COMPUTER AIDED SYSTEMS THEORY - EUROCAST 2009, 2009, 5717 : 91 - 97
  • [20] Cryptographic Security Through a Hardware Root of Trust
    Rojas-Munoz, Luis F.
    Sanchez-Solano, Santiago
    Martinez-Rodriguez, Macarena C.
    Camacho-Ruiz, Eros
    Navarro-Torrero, Pablo
    Karmakar, Apurba
    Fernandez-Garcia, Carlos
    Tena-Sanchez, Erica
    Potestad-Ordonez, Francisco E.
    Casado-Galan, Alejandro
    Ortega-Castro, Pau
    Acosta-Jimenez, Antonio J.
    Jimenez-Fernandez, Carlos J.
    Brox, Piedad
    [J]. APPLIED RECONFIGURABLE COMPUTING. ARCHITECTURES, TOOLS, AND APPLICATIONS, ARC 2024, 2024, 14553 : 106 - 119