Information Theory-Based Quantitative Evaluation Method for Countermeasures Against Fault Injection Attacks

被引:3
|
作者
Liu, Qiang [1 ]
Ning, Bo [1 ]
Deng, Pengjie [1 ]
机构
[1] Tianjin Univ, Sch Microelect, Tianjin Key Lab Imaging & Sensing Microelect Tech, Tianjin 300072, Peoples R China
基金
中国国家自然科学基金;
关键词
Circuit faults; Ciphers; Encryption; Integrated circuit modeling; Computational modeling; Fault injection attack; differential fault analysis; security quantitative evaluation; substitution-permutation network; information theory;
D O I
10.1109/ACCESS.2019.2944024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The integrated circuits are faced with the threats of fault injection attacks (FIAs), which employ the faulty results and differential fault analysis to retrieve the vital information processed by the circuits. Countermeasures should be taken to protect the circuits against FIAs. This paper proposes a security evaluation method to quantitatively analyze the resistance of block ciphers with a Substitution-Permutation Network structure against FIAs from an information-theoretic perspective. A quantitative security factor is defined based on the amount of information leakage. Specifically, an extended cipher model is proposed to numerically analyze the theoretical amount of information leakage, and an efficient approach is proposed to obtain the actual amount of information leakage. Experiments by applying the quantitative evaluation method to AES circuit validate feasibility, efficiency and scalability of the method. The experimental results show that the security factor can quantify the effects of different fault models and countermeasures. 2000 fault injections are sufficient to complete the evaluation under the considered fault models within 10 microseconds. The proposed method can be used during the circuit design stage as well as chip testing stage.
引用
收藏
页码:141920 / 141928
页数:9
相关论文
共 50 条
  • [31] Plundervolt: Software-based Fault Injection Attacks against Intel SGX
    Murdock, Kit
    Oswald, David
    Garcia, Flavio D.
    Van Bulck, Jo
    Gruss, Daniel
    Piessens, Frank
    [J]. 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 1466 - 1482
  • [32] Design for security test against fault injection attacks
    Shao, Cuiping
    Li, Huiyun
    Xu, Guoqing
    Xiong, Liying
    [J]. ELECTRONICS LETTERS, 2014, 50 (23) : 1677 - U119
  • [34] Quantitative Evaluation Method of Information Value of Initial Symptoms Based on Bayesian Theory
    Ohshima, Shigeru
    Ieda, Mayuko
    Yamamoto, Midori
    Kobayashi, Daisuke
    [J]. YAKUGAKU ZASSHI-JOURNAL OF THE PHARMACEUTICAL SOCIETY OF JAPAN, 2012, 132 (06): : 763 - 768
  • [35] Security evaluation of WDDL and SecLib countermeasures against power attacks
    Guilley, Sylvain
    Sauvage, Laurent
    Hoogvorst, Philippe
    Pacalet, Renaud
    Bertoni, Guido Marco
    Chaudhuri, Sumanta
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2008, 57 (11) : 1482 - 1497
  • [36] Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
    Kiss, Agnes
    Kraemer, Juliane
    Rauzy, Pablo
    Seifert, Jean-Pierre
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2016, 2016, 9689 : 111 - 129
  • [37] Clarifying the theory-based evaluation
    Cojocaru, Stefan
    [J]. REVISTA DE CERCETARE SI INTERVENTIE SOCIALA, 2009, 26 : 76 - 86
  • [38] Theory-Based Stakeholder Evaluation
    Hansen, Morten Balle
    Vedung, Evert
    [J]. AMERICAN JOURNAL OF EVALUATION, 2010, 31 (03) : 295 - 313
  • [39] The origins of theory-based evaluation
    Worthen, BR
    [J]. EVALUATION PRACTICE, 1996, 17 (02): : 169 - &
  • [40] A refined method for theory-based evaluation of the societal impacts of research
    Belcher, Brian M.
    Davel, Rachel
    Claus, Rachel
    [J]. METHODSX, 2020, 7