An AOP-Based Fault Injection Environment for Cryptographic SystemC Designs

被引:5
|
作者
Mestiri, Hassen [1 ]
Lahbib, Younes [1 ,2 ]
Machhout, Mohsen [1 ]
Tourki, Rached [1 ]
机构
[1] Univ Monastir, Fac Sci Monastir, Elect & Microelect Lab E EL, Monastir, Tunisia
[2] Univ Carthage, Higher Sch Technol & Comp Sci ESTI, Carthage, Tunisia
关键词
Security; cryptographic models; aspect-oriented programming; fault injection attacks; fault detection schemes; SIMULATION;
D O I
10.1142/S0218126615500085
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing complexity of cryptographic devices requires fast simulation environment in order to test their security against fault attacks. SystemC is one promising candidate in Electronic System Level that allows models to reach higher simulation speed. However in order to enable both fault injection and detection inside a SystemC cryptographic models, its code modification is mandatory. Aspect-Oriented Programming (AOP), which is a new programming paradigm, can be used to test the robustness of the cryptographic models without any code modifications. This may replace real cryptanalysis schemes. In this paper, we present a new methodology to simulate the security fault attacks of cryptographic systems at the Electronic System Level. A fault injection/detection environment is proposed to test the resistance of cryptographic SystemC models against fault injection attacks. The fault injection technique into cryptographic SystemC models is performed using weaving faults by AspectC++ as an AOP programming language. We validate our methodology with two scenarios applied to a SystemC Advanced Encryption Standard case study: the first is related to the impact of the AOP on fault detection capabilities, while the second refers to the impact of the AOP on simulation time and size of the executable files. Simulation results show that this methodology can evaluate perfectly the robustness of a cryptographic design against fault injection attacks. They show that the impact of AOP on simulation time is not significant.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] An ASCON AOP-SystemC Environment for Security Fault Analysis
    Mestiri, Hassen
    Barraj, Imen
    Bedoui, Mouna
    Machhout, Mohsen
    SYMMETRY-BASEL, 2024, 16 (03):
  • [2] An AOP-Based Security Verification Environment for KECCAK Hash Algorithm
    Mestiri, Hassen
    Barraj, Imen
    Machhout, Mohsen
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (02): : 4051 - 4066
  • [3] AOP-based ontologies for developmental toxicity
    Knudsen, T. B.
    TOXICOLOGY LETTERS, 2018, 295 : S40 - S41
  • [4] Integrative Modeling and AOP-based Simulation of Developmental Toxicity
    Knudsen, T. B.
    TOXICOLOGY LETTERS, 2018, 295 : S48 - S48
  • [5] An AOP-Based Robot Behaviors Safety Checking Method
    Ge, Binbin
    Mao, Xinjun
    Chen, Yin
    Yang, Shuo
    Yang, Shen
    2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS - COMPUTING TECHNOLOGY, INTELLIGENT TECHNOLOGY, INDUSTRIAL INFORMATION INTEGRATION (ICIICII), 2015, : 116 - 123
  • [6] An AOP-based performance evaluation framework for UML models
    Kim, Dong Kwan
    Bohner, Shawn
    31ST IEEE SOFTWARE ENGINEERING WORKSHOP, PROCEEDINGS, 2007, : 227 - 235
  • [7] AOP-based testability improvement for component-based software
    Mao, Chengying
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 547 - 552
  • [8] AOP-based automated unit test classification of large benchmarks
    Artho, Cyrille
    Chen, Zhongwei
    Honiden, Shinichi
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 17 - +
  • [9] AOP-based experimental models to evaluate effects of azole mixtures
    Moretto, A.
    Battistoni, M.
    Di Renzo, F.
    Metruccio, F.
    Palazzolo, L.
    Eberini, I.
    Menegola, E.
    TOXICOLOGY LETTERS, 2019, 314 : S293 - S293
  • [10] Scalable Fault Localization for SystemC TLM Designs
    Le, Hoang M.
    Grosse, Daniel
    Drechsler, Rolf
    DESIGN, AUTOMATION & TEST IN EUROPE, 2013, : 35 - 38