2,281 Hits in 3.6 sec

Evidence of a Larger EM-Induced Fault Model [chapter]

S. Ordas, L. Guillaume-Sage, K. Tobich, J.-M. Dutertre, P. Maurine
2015 Lecture Notes in Computer Science  
Dehbaoui et al. [3] that an electromagnetic pulse, produced with a high voltage pulse generator and a probe similar to that used to perform EM analyses, was susceptible to create faults exploitable from  ...  Electromagnetic waves have been recently pointed out as a medium for fault injection within circuits featuring cryptographic modules. Indeed, it has been experimentally demonstrated by A.  ...  Fig. 10 . 10 Fault types and illustration of EM injection e↵ects for four di↵erent settings of injection parameters: (a) V pulse = 100V , perpendicular; (b) V pulse = 100V , perpendicular; (c) V pulse  ... 
doi:10.1007/978-3-319-16763-3_15 fatcat:wkg2xwibozhn5a4o7aku5tbsf4

EM Injection: Fault Model and Locality

S. Ordas, L. Guillaume-Sage, Philippe Maurine
2015 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)  
EM injection recently emerged as an effective medium for fault injection. This paper presents an analysis of the IC susceptibility to EM pulses.  ...  It highlights that faults produced by EM pulse injection are not timing faults but correspond to a different model which is presented in this paper.  ...  As illustrated, Fig. 10 , such considerations are sufficient to explain the apparition of susceptibility windows when EM injections are performed with moderated values (V thhigh > V pulse > V thlow )  ... 
doi:10.1109/fdtc.2015.9 dblp:conf/fdtc/OrdasGM15 fatcat:onp7z6gfingknd2vliq2h2hkma

Electromagnetic fault injection: the curse of flip-flops

S. Ordas, L. Guillaume-Sage, P. Maurine
2016 Journal of Cryptographic Engineering  
ElectroMagnetic (EM) waves have been recently pointed out as a medium for fault injection within Integrated Circuits (IC).  ...  This first result clearly extends the range of the threats associated with EM fault injection.  ...  wrt t pulse for V pulse (a) =50 V, (b) = 100 V and (c) =150 V For V pulse = 150 V, the probability to inject of fault at any time during the course of the AES is equal to 1.  ... 
doi:10.1007/s13389-016-0128-3 fatcat:zvut5j5pkrc6fkoh52dwhzqzpi

Experimental Analysis of the Electromagnetic Instruction Skip Fault Model

Alexandre Menu, Jean-Max Dutertre, Olivier Potin, Jean-Baptiste Rigaud, Jean-Luc Danger
2020 2020 15th Design & Technology of Integrated Systems in Nanoscale Era (DTIS)  
We question this fault model for EM fault injection on experimental basis and report the possibility to induce several consecutive instructions skips.  ...  Microcontrollers storing valuable data or using security functions are vulnerable to fault injection attacks.  ...  Fig. 3 . 3 EM-induced single instruction skip: ability to choose the skipped instruction -Faulted registers as a function of EM injection time (ns) for a −200 V voltage amplitude and 100 ns pulse width  ... 
doi:10.1109/dtis48698.2020.9081261 dblp:conf/dtis/MenuDPRD20 fatcat:fg7lhxgfy5cfpoantr4wpsflja

Investigation of near-field pulsed EMI at IC level

Amine Dehbaoui, Jean-Max Dutertre, Bruno Robisson, Assia Tria
2013 2013 Asia-Pacific Symposium on Electromagnetic Compatibility (APEMC)  
This article describes the use of a near-field electromagnetic pulse EMP injection technique in order to perform a hardware cryptanalysis of the AES algorithm.  ...  This modification of the chip's behavior is then exploited in order to recover the AES key by using cryptanalysis techniques based on Differential Fault Analysis (DFA).  ...  induced by a very short EM pulse.  ... 
doi:10.1109/apemc.2013.7360621 fatcat:y57rhtkx45esziqhqu3qq672qy

Detecting Electromagnetic Injection Attack on FPGAs Using In-situ Timing Sensors

Surabhi Satyajit Gujar, Leyla Nazhandali
2020 Journal of Hardware and Systems Security  
The area of Electromagnetic Fault Injection (EMFI) wherein attackers can use electromagnetic (EM) pulses to induce faults has started garnering increasing attention.  ...  We look at one such technique that uses electromagnetic pulses to create faults in a system.  ...  . • EMFI Transient Probe: The EMFI probe generates high power, fast and predictable electromagnetic pulses which are used for EM fault injection in embedded processors.  ... 
doi:10.1007/s41635-020-00096-9 fatcat:g5pu6spcmzastg5gczu3ls62qi

Precise Spatio-Temporal Electromagnetic Fault Injections on Data Transfers

Alexandre Menu, Shivam Bhasin, Jean-Max Dutertre, Jean-Baptiste Rigaud, Jean-Luc Danger
2019 2019 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)  
Fault injection techniques allow an attacker to alter the behavior of an electronic device in order to extract confidential information or be granted unauthorized privileges.  ...  Next, we report practical persistent faults on ARM microcontroller, which allows an attacker to retrieve the secret key of a cipher with a single successful injection.  ...  Setup Our EM pulse injection setup is depicted in Figure 2 .  ... 
doi:10.1109/fdtc.2019.00009 dblp:conf/fdtc/MenuBDRD19 fatcat:lvkr5jzlp5cuhc2pcaci6ok4m4

Practical, Low-Cost Fault Injection Attacks on Personal Smart Devices

Shaked Delarea, Yossi Oren
2022 Applied Sciences  
We design and implement a low-cost fault injection circuit suitable for placement inside a malicious FRU, and show how it can be used to practically extract secrets from a privileged system process through  ...  In our model, the attacker integrates a fault injection circuit into a malicious field-replaceable unit, or FRU, which is later placed by the victim in close proximity to their own device.  ...  For each point, we activated the EM fault injector, which generated a pulse.  ... 
doi:10.3390/app12010417 fatcat:ohl2gyg43jcvfi6wgabgreelcy

Fault Attacks on Secure Embedded Software: Threats, Design and Evaluation [article]

Bilgiday Yuce, Patrick Schaumont, Marc Witteman
2020 arXiv   pre-print
For example, the assumption that an adversary has to be close to the physical execution of software, in order to inject an exploitable fault into hardware, has repeatedly been shown to be incorrect.  ...  The modified program execution is then analyzed and used as a source of information leakage, or as a mechanism for privilege escalation.  ...  ACKNOWLEDGEMENTS The authors would like to thank Dennis Vermoen from Riscure Security Lab for his help and support.  ... 
arXiv:2003.10513v1 fatcat:paebhdl4cjhfvp7o5skttooyym

Design of a soft-error robust microprocessor

Rodrigo Possamai Bastos, Fernanda Lima Kastensmidt, Ricardo Reis
2009 Microelectronics Journal  
Therefore, a SE does not occur due to this injected fault; • SET Injection Approach 10: it was the same that SET Injection Approach 9 except SET pulses of 100 ps were injected.  ...  Thus, a SE does not occur due to this injected fault; • SET Injection Approach 4: it was the same that SET Injection Approach 3, but the SET pulse was injected only on the node C from Figure 5 .6; • SET  ...  Fault Injection by Simulation Fault injection experiments were performed through the post-layout gate-level simulation discussed in section 5.1.1. The goal of this simulation experiment is to verify  ... 
doi:10.1016/j.mejo.2008.10.001 fatcat:pfqera6sdnbshgwa3n7ptqh76u

Stratification of Hardware Attacks: Side Channel Attacks and Fault Injection Techniques

Shaminder Kaur, Balwinder Singh, Harsimranjit Kaur
2021 SN Computer Science  
Hardware designers spent huge amount of time and effort in implementing cryptographic algorithms, keeping the analysis of design constraints into consideration.  ...  Keywords Side channel attacks (SCA) • Fault injection attacks (FIA) • Fault analysis techniques • Power glitch attacks • Spectre attack • Hardware Trojan This article is part of the topical collection  ...  There are various low cost techniques mentioned in the Table 4 such as supply glitches, clock glitches, EM pulse etc.  ... 
doi:10.1007/s42979-021-00562-3 fatcat:axqbbvgqarhnvo22ac4cdwhcby

Let's shock our IoT's heart

Sebanjila K. Bukasa, Ronan Lashermes, Jean-Louis Lanet, Axel Leqay
2018 Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES 2018  
In this paper, we explore how Electromagnetic fault injection (EMFI) can be used to create vulnerabilities in sound software, targeting a Cortex-M3 microcontroller.  ...  A fault attack is a well-known technique where the behaviour of a chip is voluntarily disturbed by hardware means in order to undermine the security of the information handled by the target.  ...  An irreducible latency of 600ns is added by our fault injection platform between the input trigger and the EM pulse.  ... 
doi:10.1145/3230833.3230842 dblp:conf/IEEEares/BukasaLLL18 fatcat:xhrpeqlvpvel3h3rmtwac2vhse

On the Complexity Reduction of Laser Fault Injection Campaigns Using OBIC Measurements

Falk Schellenberg, Markus Finkeldey, Bastian Richter, Maximilian Schapers, Nils Gerhardt, Martin Hofmann, Christof Paar
2015 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)  
Laser Fault Injection (LFI) is one of the most powerful methods of inducing a fault as it allows targeting only specific areas down to single transistors.  ...  An exhaustive search through all parameters including dimensions for correct timing, intensity, or length might not be not feasible.  ...  for providing the SEM images.  ... 
doi:10.1109/fdtc.2015.10 dblp:conf/fdtc/SchellenbergFRS15 fatcat:ornfvtd3uvh7zmsvfknw4f7e4i

Modeling the Instrumentation and Control Systems of Fast Breeder Nuclear Reactor

P Swaminathan
2007 International Journal on Intelligent Electronic Systems  
Format for display of fault messages in Large Video display units at control room should take into account psychology of plant operator.  ...  Improper design of Instrumentation & Control (I&C) systems is one of the main reasons for human errors during the operation and maintenance phase of Nuclear reactors.  ...  If a pulse is injected in any two channels of a parameter, then the pulse is expected at EM coil. If pulse is not detected then the fault is termed as 'unsafe fault'.  ... 
doi:10.18000/ijies.30001 fatcat:4awjkmot7vbuthselrmn27227y

A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices [chapter]

Timo Kasper, David Oswald, Christof Paar
2010 Lecture Notes in Computer Science  
We present a unified framework for advanced implementation attacks that allows for conducting automated side-channel analysis and fault injection targeting all kinds of embedded cryptographic devices including  ...  The corresponding data acquisition system for side-channel attacks makes precise power and EM analyses possible.  ...  and EM fault injections.  ... 
doi:10.1007/978-3-642-17499-5_5 fatcat:yd7vx5jw5vh2boctlr2z2hjxcm
« Previous Showing results 1 — 15 out of 2,281 results