Filters








626 Hits in 3.5 sec

Stratification of Hardware Attacks: Side Channel Attacks and Fault Injection Techniques

Shaminder Kaur, Balwinder Singh, Harsimranjit Kaur
2021 SN Computer Science  
Cryptographic devices have many encrypted and secured solutions to protect them against hardware attacks.  ...  Keywords Side channel attacks (SCA) • Fault injection attacks (FIA) • Fault analysis techniques • Power glitch attacks • Spectre attack • Hardware Trojan This article is part of the topical collection  ...  Propagation delays change timing properties of CMOS devices [56] Clock glitch attack Highly accurate clock glitch genera- tor is proposed on AES.  ... 
doi:10.1007/s42979-021-00562-3 fatcat:axqbbvgqarhnvo22ac4cdwhcby

The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs [article]

Otto Bittner, Thilo Krachenfels, Andreas Galauner, Jean-Pierre Seifert
2021 arXiv   pre-print
Glitching the supply voltage can cause data value corruption, skip security checks, or enable protected code paths.  ...  Since these embedded devices are often physically accessible by attackers, vendors must consider device tampering in their threat models.  ...  One could try to detect malicious voltage drops/glitches, and as a consequence, shut down the system to prevent further damage.  ... 
arXiv:2108.06131v2 fatcat:7oor7ezryrbevksuyjxa5zhjnm

Machine Learning Methods to Detect Voltage Glitch Attacks on IoT/IIoT Infrastructures

Wei Jiang, Konstantinos Demertzis
2022 Computational Intelligence and Neuroscience  
One of the most dangerous attacks of this type is voltage glitch attacks (VGAs), which can change the intended behavior of a system.  ...  This study proposes an innovative VGAs detection system based on advanced machine learning.  ...  Side-channel attacks, fault attacks, optical fault injection, electromagnetic fault injection, clock/voltage glitch, and other examples of this sort of attack vary depending on the medium utilized. [13  ... 
doi:10.1155/2022/6044071 pmid:35515505 pmcid:PMC9064520 fatcat:3xcnx2lwgbfenhzeroowqlaimi

A Review on Evaluation and Configuration of Fault Injection Attack Instruments to Design Attack Resistant MCU-Based IoT Applications

Zahra Kazemi, David Hely, Mahdi Fazeli, Vincent Beroulle
2020 Electronics  
Fault attacks are the noticeable type of physical attacks, in which the normal and secure behavior of the targeted devices is liable to be jeopardized.  ...  Two of the primary means of fault attacks are clock and voltage fault injection.  ...  Moreover, they are the most used techniques in attacks against IoT devices with medium security.  ... 
doi:10.3390/electronics9071153 fatcat:v7besqcahjgbrbtgndlxglwcuq

Shaping the Glitch: Optimizing Voltage Fault Injection Attacks

Claudio Bozzato, Riccardo Focardi, Francesco Palmarini
2019 Transactions on Cryptographic Hardware and Embedded Systems  
Voltage fault injection is a powerful active side channel attack that modifies the execution-flow of a device by creating disturbances on the power supply line.  ...  Among the presented attacks, the most challenging ones exploit multiple vulnerabilities and inject over one million glitches, heavily leveraging on the performance and repeatability of the new proposed  ...  Security mechanisms. The bootloader offers a security mechanism to lock the device and prevent any read or write operations on the flash memory.  ... 
doi:10.13154/tches.v2019.i2.199-224 dblp:journals/tches/BozzatoFP19 fatcat:xayinsq2ajgj3bwczer6ti25wa

Voltage regulator assisted lightweight countermeasure against fault injection attacks [article]

Ali Vosoughi, Longfei Wang, Selçuk Köse
2020 arXiv   pre-print
The robustness of a CC against voltage glitch attacks increases with an on-chip voltage regulator that considers the impact of topology and component selection on the fault injection robustness.  ...  Using the infective countermeasure for fault resiliency, the security-enhanced CC provides a robust and resilient solution against fault attacks that improve the security and availability of the device  ...  Similarly, the attacker comprehends that if the injected glitch voltage is too high for the CMOS device of the CC, the device will breakdown.  ... 
arXiv:2001.03230v1 fatcat:fjl3o4tklbejtij2vp6hsel2be

Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection [chapter]

Rafael Boix Carpi, Stjepan Picek, Lejla Batina, Federico Menarini, Domagoj Jakobovic, Marin Golub
2014 Lecture Notes in Computer Science  
With this approach we found some of off-the-shelf devices, although secured against this type of attacks, still vulnerable.  ...  Fault analysis poses a serious threat to embedded security devices, especially smart cards.  ...  Namely, we distinguish between two phases for glitching, one focusing on voltage parameters and the other one on proper timing.  ... 
doi:10.1007/978-3-319-14123-7_16 fatcat:iym4imna5rcthoa2q3loobhkdy

Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection [chapter]

Rafael Boix Carpi, Stjepan Picek, Lejla Batina, Federico Menarini, Domagoj Jakobovic, Marin Golub
2014 Lecture Notes in Computer Science  
With this approach we found some of off-the-shelf devices, although secured against this type of attacks, still vulnerable.  ...  Fault analysis poses a serious threat to embedded security devices, especially smart cards.  ...  Namely, we distinguish between two phases for glitching, one focusing on voltage parameters and the other one on proper timing.  ... 
doi:10.1007/978-3-319-08302-5_16 fatcat:hyr5fb6mojfenb4jk7fjuqgmtu

Hardware Security Evaluation of MAX 10 FPGA [article]

Sergei Skorobogatov
2019 arXiv   pre-print
This paper shows preliminary evaluation of hardware security in Intel MAX 10 devices.  ...  Its purpose is to highlight the most vulnerable areas to attacks aimed at data extraction and reverse engineering. That way further investigations could be performed on specific areas of concern.  ...  Intel was notified about the existence of vulnerabilities in MAX 10 devices via secure@intel.com.  ... 
arXiv:1910.05086v1 fatcat:lyheijgy5jhmtfteaknzbmfj64

Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis

Jan Van den Herrewegen, David Oswald, Flavio D. Garcia, Qais Temeiza
2020 Transactions on Cryptographic Hardware and Embedded Systems  
multi-glitch attack on a real-world target; 3) we apply symbolic execution to precisely aim voltage glitches at target instructions based on the execution path in the bootloader of the Renesas 78K0 automotive  ...  glitching to develop a powerful attack methodology against embedded bootloaders.  ...  Thus, however strong security primitives a specific system is built on, a vulnerable bootloader undoes all of this and makes the device susceptible to various attacks ranging from firmware readout to a  ... 
doi:10.46586/tches.v2021.i1.56-81 fatcat:tzychvibcfaejcj23kdiwbqmkm

Fault Attacks on Secure Embedded Software: Threats, Design and Evaluation [article]

Bilgiday Yuce, Patrick Schaumont, Marc Witteman
2020 arXiv   pre-print
This article is a review on hardware-based fault attacks on software, with emphasis on the context of embedded systems.  ...  However, we emphasize that improvements to countermeasures often build on insight into the attacks.  ...  ACKNOWLEDGEMENTS The authors would like to thank Dennis Vermoen from Riscure Security Lab for his help and support.  ... 
arXiv:2003.10513v1 fatcat:paebhdl4cjhfvp7o5skttooyym

Electrochemical Behavior and Analytical Applications of Electronically Type-Sorted Carbon Nanotube Electrode

2016 Sensors and materials  
The objective of the proposed secure circuit with an on-chip temperature sensor is to detect temperature-based fault injection attacks and protect the secure contents of the target device.  ...  Keywords: secure circuit, hardware security, physical attack protection, fault injection attacks, temperature fault injection attacks In this paper, we present a secure circuit with a low-power on-chip  ...  The objective of the proposed secure circuit with the on-chip temperature sensor is to detect the temperature-based fault injection attacks and protect the secure contents of the target device.  ... 
doi:10.18494/sam.2016.1157 fatcat:oaspb6heivgmdbuuhgvpoubhpu

Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms [chapter]

Shivam Bhasin, Debdeep Mukhopadhyay
2016 Lecture Notes in Computer Science  
Mukhopadhyay Fault Injection Attacks 13 / 37 • Glitches effect are short-lived.  ...  on range of devices + Low expertise required -Limited precision • Local + Precise and powerful + Can bypass basic protections -High expertise required -Expensive equipments • • • Potential for  ...  Static Device  ... 
doi:10.1007/978-3-319-49445-6_24 fatcat:7xlppx3hljcs7f6ppglqz2wyyq

A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices [chapter]

Timo Kasper, David Oswald, Christof Paar
2010 Lecture Notes in Computer Science  
Our proposed low-cost setup consists of modular functional units that can be interchanged, depending on the demands of a concrete attack scenario.  ...  We present a unified framework for advanced implementation attacks that allows for conducting automated side-channel analysis and fault injection targeting all kinds of embedded cryptographic devices including  ...  glitch voltage level V low, 2 .  ... 
doi:10.1007/978-3-642-17499-5_5 fatcat:yd7vx5jw5vh2boctlr2z2hjxcm

One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization [article]

Robert Buhren, Hans Niklas Jacob, Thilo Krachenfels, Jean-Pierre Seifert
2021 arXiv   pre-print
We present a voltage glitching attack that allows an attacker to execute custom payloads on the AMD-SPs of all microarchitectures that support SEV currently on the market (Zen 1, Zen 2, and Zen 3).  ...  To separate security-sensitive operations from software executing on the main x86 cores, SEV leverages the AMD Secure Processor (AMD-SP).  ...  RELATED WORK Voltage glitching attacks targeting security-sensitive operations on CPUs have been subject to extensive analysis in the past.  ... 
arXiv:2108.04575v4 fatcat:zmj2cww5dzb4djki5jzckbgfhm
« Previous Showing results 1 — 15 out of 626 results